General

  • Target

    3f943f8381e471884ad0d8b43ca80ae6eefacd67b6ffdfa2fff0c69a3c0496e5

  • Size

    22.1MB

  • Sample

    240430-tklwlsce79

  • MD5

    f453e543fe7eb5d71b420ee0842b253a

  • SHA1

    395b0722c9ac6b8d9e5642cf4aa0506bd5b5311a

  • SHA256

    3f943f8381e471884ad0d8b43ca80ae6eefacd67b6ffdfa2fff0c69a3c0496e5

  • SHA512

    055fbde6a2c2bae5b3b896d31845bf7a41d9a593d85f34f7672028f3e88e38d016043f06f745daafff407687fd30c36769e2a94d65bd4571a243e652933fcb90

  • SSDEEP

    393216:XEkBOL3/pyDp5nSNPG7NmiZoUW+eGQRZMTozGxu8C0ibfz6eIau5qW80hoA/g7Z5:XU4DpRoKEANW+e5RsoztZ026eW5qW80g

Malware Config

Targets

    • Target

      3f943f8381e471884ad0d8b43ca80ae6eefacd67b6ffdfa2fff0c69a3c0496e5

    • Size

      22.1MB

    • MD5

      f453e543fe7eb5d71b420ee0842b253a

    • SHA1

      395b0722c9ac6b8d9e5642cf4aa0506bd5b5311a

    • SHA256

      3f943f8381e471884ad0d8b43ca80ae6eefacd67b6ffdfa2fff0c69a3c0496e5

    • SHA512

      055fbde6a2c2bae5b3b896d31845bf7a41d9a593d85f34f7672028f3e88e38d016043f06f745daafff407687fd30c36769e2a94d65bd4571a243e652933fcb90

    • SSDEEP

      393216:XEkBOL3/pyDp5nSNPG7NmiZoUW+eGQRZMTozGxu8C0ibfz6eIau5qW80hoA/g7Z5:XU4DpRoKEANW+e5RsoztZ026eW5qW80g

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks