General

  • Target

    VX9.exe

  • Size

    47.0MB

  • Sample

    240419-d4kvnafe67

  • MD5

    3191897dff8b07b609d7c8e57a130399

  • SHA1

    e7900a91c5dd517074fd06f512699c9d55606a07

  • SHA256

    6c9e3613fc6b77a8e383b1d5fb8bec58b82d34334d86fc8ba3914f0725ac583d

  • SHA512

    2a05421ec98edf4e68e34e10c5fb4cbb5310449ef7bc07f74917693bfe17bec00ed6a034c9dd5138a9b0320f210353b0fbffe41378b3af4c8c37dcecdf458b4c

  • SSDEEP

    393216:iv9EokQhXGzNh2Jp5M8cFqyzgsmUzKoc5Ytj10:E92QGNhyXyxWocq

Malware Config

Targets

    • Target

      VX9.exe

    • Size

      47.0MB

    • MD5

      3191897dff8b07b609d7c8e57a130399

    • SHA1

      e7900a91c5dd517074fd06f512699c9d55606a07

    • SHA256

      6c9e3613fc6b77a8e383b1d5fb8bec58b82d34334d86fc8ba3914f0725ac583d

    • SHA512

      2a05421ec98edf4e68e34e10c5fb4cbb5310449ef7bc07f74917693bfe17bec00ed6a034c9dd5138a9b0320f210353b0fbffe41378b3af4c8c37dcecdf458b4c

    • SSDEEP

      393216:iv9EokQhXGzNh2Jp5M8cFqyzgsmUzKoc5Ytj10:E92QGNhyXyxWocq

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks