General

  • Target

    Spoofer.exe

  • Size

    16.8MB

  • Sample

    240409-cgqa7abb36

  • MD5

    eb13941aa440f228923e0b8557408a96

  • SHA1

    5a246d1ca2f712c6d67312e1fda196218a6b0de6

  • SHA256

    2aad2a2097f6b6aa980121a5f394d7f0fad48b7e33198670e417c86a303ad59b

  • SHA512

    010b3fc57054be6869916cde88bd3792669ab5d7bcadce78562564af373999df9ad7087b2cd261e0f2b437d2d572d7588b78ab0f934abce0ec823a5a5674e07a

  • SSDEEP

    196608:iC0sKYu/PaQts1k4FMIZETSRjPePdrQJM96KbABLOqi8wC7hzYPOCl8de/yDMkfS:RQtseQETSRvJQnqOqi81zdCyd76

Malware Config

Targets

    • Target

      Spoofer.exe

    • Size

      16.8MB

    • MD5

      eb13941aa440f228923e0b8557408a96

    • SHA1

      5a246d1ca2f712c6d67312e1fda196218a6b0de6

    • SHA256

      2aad2a2097f6b6aa980121a5f394d7f0fad48b7e33198670e417c86a303ad59b

    • SHA512

      010b3fc57054be6869916cde88bd3792669ab5d7bcadce78562564af373999df9ad7087b2cd261e0f2b437d2d572d7588b78ab0f934abce0ec823a5a5674e07a

    • SSDEEP

      196608:iC0sKYu/PaQts1k4FMIZETSRjPePdrQJM96KbABLOqi8wC7hzYPOCl8de/yDMkfS:RQtseQETSRvJQnqOqi81zdCyd76

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks