General

  • Target

    mediaget_3.01.4319.zip

  • Size

    119.6MB

  • Sample

    240430-wy6jaacg9w

  • MD5

    9a64a2af1d91abf7ab0f8beef07e8864

  • SHA1

    8d2315d3f5082de893aff175c3c0bbb48c3f3cb5

  • SHA256

    f073344ffdd3d5d6c8da8bf71bcdab1a5c317ca76d92c5534284a045c7ef95f6

  • SHA512

    141711ae68a48bfbf0b29ab7a4ff1214fd803205f18cf8a88cc5e50fbef673231b8981382aa94ee6c29c05753b237cd660ba7fb9c176c9ce86c27f9628ad386e

  • SSDEEP

    3145728:aglj6uoN651+nCTdl5Qn2j/xYFHWOLJCUwkwf+bkPoCP0w0l:56LCUCTVgmxYFtNgkwukP3PJM

Malware Config

Targets

    • Target

      mediaget_3.01.4319.zip

    • Size

      119.6MB

    • MD5

      9a64a2af1d91abf7ab0f8beef07e8864

    • SHA1

      8d2315d3f5082de893aff175c3c0bbb48c3f3cb5

    • SHA256

      f073344ffdd3d5d6c8da8bf71bcdab1a5c317ca76d92c5534284a045c7ef95f6

    • SHA512

      141711ae68a48bfbf0b29ab7a4ff1214fd803205f18cf8a88cc5e50fbef673231b8981382aa94ee6c29c05753b237cd660ba7fb9c176c9ce86c27f9628ad386e

    • SSDEEP

      3145728:aglj6uoN651+nCTdl5Qn2j/xYFHWOLJCUwkwf+bkPoCP0w0l:56LCUCTVgmxYFtNgkwukP3PJM

    • Contacts a large (4565) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks