Resubmissions

16/04/2024, 20:18

240416-y3m9lsbf56 8

16/04/2024, 20:15

240416-y1tzdadb41 8

General

  • Target

    antagonist-external.exe

  • Size

    651KB

  • Sample

    240416-y3m9lsbf56

  • MD5

    c25a1d9ed1b660a779bfe078d938cd5f

  • SHA1

    401f9aba29fa919b8b446ae522d081d6497bee69

  • SHA256

    34441593ad36d22cc2bd8329b5fe9876872b9618ecc3e30f6a47cbf2162a57bd

  • SHA512

    157af8d61a4d096750f34d59d8d3ca80433bfe9666d977a5898a73c89336afaa6736d4f7d41806753e21b7f36cab5cb9c86cde0f4d51496ec6666dfc0196091e

  • SSDEEP

    6144:9o7HTV+q8KSzgpbl69QalhhLGOVJZIOVmxiTQhTWeMpnAB549/UXXHBeOp/xG17C:i7ezg5Y9Nlf+X5SXkeOps17h98rKe

Malware Config

Targets

    • Target

      antagonist-external.exe

    • Size

      651KB

    • MD5

      c25a1d9ed1b660a779bfe078d938cd5f

    • SHA1

      401f9aba29fa919b8b446ae522d081d6497bee69

    • SHA256

      34441593ad36d22cc2bd8329b5fe9876872b9618ecc3e30f6a47cbf2162a57bd

    • SHA512

      157af8d61a4d096750f34d59d8d3ca80433bfe9666d977a5898a73c89336afaa6736d4f7d41806753e21b7f36cab5cb9c86cde0f4d51496ec6666dfc0196091e

    • SSDEEP

      6144:9o7HTV+q8KSzgpbl69QalhhLGOVJZIOVmxiTQhTWeMpnAB549/UXXHBeOp/xG17C:i7ezg5Y9Nlf+X5SXkeOps17h98rKe

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks