General

  • Target

    setup.exe

  • Size

    16.1MB

  • Sample

    240420-m68tyafa53

  • MD5

    186702c4560d4894565a07bea047aff5

  • SHA1

    bf2b08eb18ef06b58c470ec2f68c9270c0912bc6

  • SHA256

    b858aacbb644c4652083e3155b4748677ff650b2e1fb8fe190b9ba3078cf7e28

  • SHA512

    f71e3b5ed622c8b8a2e78bf990c89fb1d25765491b846881bb0d74f083a3e8ef6554a3e8c07d6c0698d329746f7ea10198cba2d5e8826591dd49b075a7a271c3

  • SSDEEP

    393216:Eu7L/Cgf8igP8AxYDX1+TtIiFGuvB5IjWqn6eCz16yxXUdV:ECL6bibX71QtIZS3ILn6eDyqV

Malware Config

Targets

    • Target

      setup.exe

    • Size

      16.1MB

    • MD5

      186702c4560d4894565a07bea047aff5

    • SHA1

      bf2b08eb18ef06b58c470ec2f68c9270c0912bc6

    • SHA256

      b858aacbb644c4652083e3155b4748677ff650b2e1fb8fe190b9ba3078cf7e28

    • SHA512

      f71e3b5ed622c8b8a2e78bf990c89fb1d25765491b846881bb0d74f083a3e8ef6554a3e8c07d6c0698d329746f7ea10198cba2d5e8826591dd49b075a7a271c3

    • SSDEEP

      393216:Eu7L/Cgf8igP8AxYDX1+TtIiFGuvB5IjWqn6eCz16yxXUdV:ECL6bibX71QtIZS3ILn6eDyqV

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks