General

  • Target

    bulked-spoof.exe

  • Size

    17.0MB

  • Sample

    240504-v2l4dafe79

  • MD5

    eb7ddb67f4fb04777df8e2953a867bbe

  • SHA1

    a6735bd3e44bca0997f3911da372689e254cad86

  • SHA256

    4399046ebac5b5f6f5f6acb0826feca5a9c91bfba05a4d9dce6eb6c1d2b28c2b

  • SHA512

    f376b7915f5b60a939cb280195faed19bf8cd91f53dc6cfad95f8d1e7d5ecd90595f1f2d18191efc184cf5b7fdf4eb6ba0c7d330d0a767e252f188cf4f52d520

  • SSDEEP

    393216:Hv9EokQhXGYFaoh2Jp5M6SAeYIG2QqzmB1SQRC0:P92QfFaoh4F/vq+11RL

Malware Config

Targets

    • Target

      bulked-spoof.exe

    • Size

      17.0MB

    • MD5

      eb7ddb67f4fb04777df8e2953a867bbe

    • SHA1

      a6735bd3e44bca0997f3911da372689e254cad86

    • SHA256

      4399046ebac5b5f6f5f6acb0826feca5a9c91bfba05a4d9dce6eb6c1d2b28c2b

    • SHA512

      f376b7915f5b60a939cb280195faed19bf8cd91f53dc6cfad95f8d1e7d5ecd90595f1f2d18191efc184cf5b7fdf4eb6ba0c7d330d0a767e252f188cf4f52d520

    • SSDEEP

      393216:Hv9EokQhXGYFaoh2Jp5M6SAeYIG2QqzmB1SQRC0:P92QfFaoh4F/vq+11RL

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks