Resubmissions

27-04-2024 15:54

240427-tb9lbadd3z 10

27-04-2024 15:50

240427-s9943acg29 10

General

  • Target

    PizzaTower.exe

  • Size

    7.1MB

  • Sample

    240427-s9943acg29

  • MD5

    d4c2e3ad524c2112712f0b762ab38bb9

  • SHA1

    f48e48895154c1f8ee0b389eca15236b920efd1a

  • SHA256

    bf3973747453f2d6437ced09d04d29d2c917ebe3412d2532b5229e949ceef5bb

  • SHA512

    e76d79189bfe32dd4664645b5080063cc71734c6d5e7f54a75116efeff5b61c5ce4e69f72b969e70a77b17952656bed6913f96df07cc6730a4e79ae6df8641aa

  • SSDEEP

    196608:QCT+aj1rpnrJehwiIbZg4TIdQNm5XKCt7ogJwDb2:QCT+aoqbCdQyftNJwDb2

Malware Config

Targets

    • Target

      PizzaTower.exe

    • Size

      7.1MB

    • MD5

      d4c2e3ad524c2112712f0b762ab38bb9

    • SHA1

      f48e48895154c1f8ee0b389eca15236b920efd1a

    • SHA256

      bf3973747453f2d6437ced09d04d29d2c917ebe3412d2532b5229e949ceef5bb

    • SHA512

      e76d79189bfe32dd4664645b5080063cc71734c6d5e7f54a75116efeff5b61c5ce4e69f72b969e70a77b17952656bed6913f96df07cc6730a4e79ae6df8641aa

    • SSDEEP

      196608:QCT+aj1rpnrJehwiIbZg4TIdQNm5XKCt7ogJwDb2:QCT+aoqbCdQyftNJwDb2

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Process Discovery

1
T1057

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks