General

  • Target

    SecuriteInfo.com.Python.Stealer.1437.14994.32063.exe

  • Size

    18.1MB

  • Sample

    240424-asxhjada7w

  • MD5

    89ab0264f2da9c37933f11d49bfed3e2

  • SHA1

    bf05f123bb5cc708f1f4970082826886277d54ee

  • SHA256

    eef7738228a8044df536ff5424d2b4ca8dcf6f522ef8e3e0de644cc0e5abaa7b

  • SHA512

    c55cf158be1140f2867c93cd893b8ebaec55b00107dfdb32e815050c6949b315322650940eb10083773cb65dab339d3e5fcdaf5dcae3d9b17d256a4e5cbdf120

  • SSDEEP

    393216:pu7L/sQ86P8AxYDwdQusl+l99oWOv+9rzg0T2+XyZX:pCL0Q8ZXsdQu/DorvSrM0Tvy

Malware Config

Targets

    • Target

      SecuriteInfo.com.Python.Stealer.1437.14994.32063.exe

    • Size

      18.1MB

    • MD5

      89ab0264f2da9c37933f11d49bfed3e2

    • SHA1

      bf05f123bb5cc708f1f4970082826886277d54ee

    • SHA256

      eef7738228a8044df536ff5424d2b4ca8dcf6f522ef8e3e0de644cc0e5abaa7b

    • SHA512

      c55cf158be1140f2867c93cd893b8ebaec55b00107dfdb32e815050c6949b315322650940eb10083773cb65dab339d3e5fcdaf5dcae3d9b17d256a4e5cbdf120

    • SSDEEP

      393216:pu7L/sQ86P8AxYDwdQusl+l99oWOv+9rzg0T2+XyZX:pCL0Q8ZXsdQu/DorvSrM0Tvy

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks