General

  • Target

    GameSense.exe

  • Size

    14.4MB

  • Sample

    240428-m54htseb72

  • MD5

    f564598fd7d0c0b4b277edf7f5c08054

  • SHA1

    1c1addcb8680e08c0fd060f6dcb8777037d75140

  • SHA256

    b9a1b7b656cabd8c960f495001d872a79032cc7ddf3c7134708af1c9486caab4

  • SHA512

    46865494f90843aaccd780c45fb32df70f23d4830179af113f049d92024e689b4076cf231c99624dd292bc841d0ce2f6001754758f2aa71287a30520604df303

  • SSDEEP

    393216:ciiIE7YoPQ6dQuslSq99oWOv+9fguz6L8/gw:cL7rPQ6dQuSDorvSYuzh/9

Malware Config

Targets

    • Target

      GameSense.exe

    • Size

      14.4MB

    • MD5

      f564598fd7d0c0b4b277edf7f5c08054

    • SHA1

      1c1addcb8680e08c0fd060f6dcb8777037d75140

    • SHA256

      b9a1b7b656cabd8c960f495001d872a79032cc7ddf3c7134708af1c9486caab4

    • SHA512

      46865494f90843aaccd780c45fb32df70f23d4830179af113f049d92024e689b4076cf231c99624dd292bc841d0ce2f6001754758f2aa71287a30520604df303

    • SSDEEP

      393216:ciiIE7YoPQ6dQuslSq99oWOv+9fguz6L8/gw:cL7rPQ6dQuSDorvSYuzh/9

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks