Resubmissions

10-04-2024 02:22

240410-ctrd1sfc4s 7

10-04-2024 02:22

240410-ctq39afc31 7

10-04-2024 02:22

240410-ctpv7abh78 7

10-04-2024 02:22

240410-ctnywsbh76 7

13-05-2023 09:04

230513-k1k5ksfh55 7

General

  • Target

    quick_telegram_sender.exe

  • Size

    418KB

  • Sample

    240410-ctnywsbh76

  • MD5

    0010d6181a1834c89562503bb2b30924

  • SHA1

    a9a3b1422ba13b36756c1ec5725402beb703047a

  • SHA256

    0fa222fb1c108d47b8d3e7c54753774d5f5098b462c5231a64031a574509a6f3

  • SHA512

    99c682d478ba735eb8bd070877863a188ff2be5448b6806be15c0b1d6c9fe15d0ab40c53387d658a0d02a63e982a664f2788f00ee355dc3653c1fc499184cbf1

  • SSDEEP

    6144:1QwbzMWa3UnvU6dJm/tB9+nNm1GTeh9bU9H/DNA460Jyx0c:exUc6d0v9mNTTe09fRA/0

Malware Config

Targets

    • Target

      quick_telegram_sender.exe

    • Size

      418KB

    • MD5

      0010d6181a1834c89562503bb2b30924

    • SHA1

      a9a3b1422ba13b36756c1ec5725402beb703047a

    • SHA256

      0fa222fb1c108d47b8d3e7c54753774d5f5098b462c5231a64031a574509a6f3

    • SHA512

      99c682d478ba735eb8bd070877863a188ff2be5448b6806be15c0b1d6c9fe15d0ab40c53387d658a0d02a63e982a664f2788f00ee355dc3653c1fc499184cbf1

    • SSDEEP

      6144:1QwbzMWa3UnvU6dJm/tB9+nNm1GTeh9bU9H/DNA460Jyx0c:exUc6d0v9mNTTe09fRA/0

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks