Resubmissions

17/04/2024, 14:49

240417-r7fa8sec6s 7

General

  • Target

    StudioStealer.zip

  • Size

    21.7MB

  • Sample

    240417-r7fa8sec6s

  • MD5

    ee7427bbf92ee4f625efcee3f55c6385

  • SHA1

    55177b837f531272e5c351380463deb100df88f7

  • SHA256

    dad7dd65f13857d4452787e347caeefa7942716dea3fce8d37e7736fbcef0f37

  • SHA512

    0323185f91a7ce659a842d9305878ecd68387a70af87a99f3df65a9404182a9a1c0bf677494c8ef1ef845b81ae741b005653284239f9bc93b650e0868d9fd20c

  • SSDEEP

    393216:ewkhm7OVU5YGS7skueL5Teh5tcWw/EuNBcr2isU9iWoD3Qcw5dtA/e/f0QGDbJ2D:eRASGKN1Xh+r/xlsYivB4dtA/eX0QGDW

Malware Config

Targets

    • Target

      StudioStealer.zip

    • Size

      21.7MB

    • MD5

      ee7427bbf92ee4f625efcee3f55c6385

    • SHA1

      55177b837f531272e5c351380463deb100df88f7

    • SHA256

      dad7dd65f13857d4452787e347caeefa7942716dea3fce8d37e7736fbcef0f37

    • SHA512

      0323185f91a7ce659a842d9305878ecd68387a70af87a99f3df65a9404182a9a1c0bf677494c8ef1ef845b81ae741b005653284239f9bc93b650e0868d9fd20c

    • SSDEEP

      393216:ewkhm7OVU5YGS7skueL5Teh5tcWw/EuNBcr2isU9iWoD3Qcw5dtA/e/f0QGDbJ2D:eRASGKN1Xh+r/xlsYivB4dtA/eX0QGDW

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks