General

  • Target

    Copy_Server.exe

  • Size

    17.0MB

  • Sample

    240429-z9bd3acf51

  • MD5

    c22ec0781c1039f0dcac6604ddd2cd16

  • SHA1

    6adb6d849499ef8b13bf6dc1e1f399623eb6502d

  • SHA256

    1f0b5bf2acb3d65094bad84bed510dde2981d43adb1dd1753d7616234be434b4

  • SHA512

    08fcab486f47d1019286cf35db903a771377561d69a3e1ad23342398be3032e2d457c7dd55a2fb32ee6974a248378d590c4ddda30bab8f8799feb79a8ac15fae

  • SSDEEP

    393216:aWHiIE7YoPQK9dM/IS+DfDgrc6ZczfnDfuF:Dc7rPQKT6IS+b0IBzfDf

Malware Config

Targets

    • Target

      Copy_Server.exe

    • Size

      17.0MB

    • MD5

      c22ec0781c1039f0dcac6604ddd2cd16

    • SHA1

      6adb6d849499ef8b13bf6dc1e1f399623eb6502d

    • SHA256

      1f0b5bf2acb3d65094bad84bed510dde2981d43adb1dd1753d7616234be434b4

    • SHA512

      08fcab486f47d1019286cf35db903a771377561d69a3e1ad23342398be3032e2d457c7dd55a2fb32ee6974a248378d590c4ddda30bab8f8799feb79a8ac15fae

    • SSDEEP

      393216:aWHiIE7YoPQK9dM/IS+DfDgrc6ZczfnDfuF:Dc7rPQKT6IS+b0IBzfDf

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Tasks