General

  • Target

    DDos_setup.exe

  • Size

    16.9MB

  • Sample

    240423-zgzwysbg32

  • MD5

    e3d0cd9f16d1067023f3c1653ce274a2

  • SHA1

    9e1069c4f360dd952f98b437507aa894f10f12f4

  • SHA256

    1bab40b53d904dad4a6dbba67af6b2405dddb8eba2c9b3c7818c32102f7c3289

  • SHA512

    23919020ce7f28affd9c54dd84641a0ac4d135d5176f0bc39d59531aeb0bf6bad810459d77d364ee22688fc6b965b67d3010d56203654d18cd933b68e53a4d92

  • SSDEEP

    393216:UgEkZgf8BQjgP8AxYDX1+TtIiFGuvB5IjWqn6ed+Ez1jPYrb5NWjjvKa:UgRbBQjbX71QtIZS3ILn6edtK7ejvKa

Malware Config

Targets

    • Target

      DDos_setup.exe

    • Size

      16.9MB

    • MD5

      e3d0cd9f16d1067023f3c1653ce274a2

    • SHA1

      9e1069c4f360dd952f98b437507aa894f10f12f4

    • SHA256

      1bab40b53d904dad4a6dbba67af6b2405dddb8eba2c9b3c7818c32102f7c3289

    • SHA512

      23919020ce7f28affd9c54dd84641a0ac4d135d5176f0bc39d59531aeb0bf6bad810459d77d364ee22688fc6b965b67d3010d56203654d18cd933b68e53a4d92

    • SSDEEP

      393216:UgEkZgf8BQjgP8AxYDX1+TtIiFGuvB5IjWqn6ed+Ez1jPYrb5NWjjvKa:UgRbBQjbX71QtIZS3ILn6edtK7ejvKa

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks