General

  • Target

    SLOT.exe

  • Size

    16.4MB

  • Sample

    240428-qext5sgh9w

  • MD5

    ee23ec57039b1b9c1f4bc1a34abdf3d3

  • SHA1

    8f5f3b3046b9f95d277bcb68e865acec4b89041a

  • SHA256

    02e2c6f2c0522c5259576e3743a4d722364a72a15df1bf90d5cd0d8329a8dd58

  • SHA512

    845719ba36f4e1f40dde8b1785a04271798bc7f459e375ae97ff2c75944dac31cc9985c8a1488d59244333d251991d87c596a38e7673535c229c9534eb738eb4

  • SSDEEP

    393216:eh9SCD5WhGh2Jp5MLurEUWj77y7zE5PKk9buK+:49foGhpdbXy7zbkEK+

Malware Config

Targets

    • Target

      SLOT.exe

    • Size

      16.4MB

    • MD5

      ee23ec57039b1b9c1f4bc1a34abdf3d3

    • SHA1

      8f5f3b3046b9f95d277bcb68e865acec4b89041a

    • SHA256

      02e2c6f2c0522c5259576e3743a4d722364a72a15df1bf90d5cd0d8329a8dd58

    • SHA512

      845719ba36f4e1f40dde8b1785a04271798bc7f459e375ae97ff2c75944dac31cc9985c8a1488d59244333d251991d87c596a38e7673535c229c9534eb738eb4

    • SSDEEP

      393216:eh9SCD5WhGh2Jp5MLurEUWj77y7zE5PKk9buK+:49foGhpdbXy7zbkEK+

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks