Resubmissions

04/05/2024, 18:03

240504-wm1hwsdf6s 10

04/05/2024, 18:00

240504-wlak3sge56 10

04/05/2024, 17:51

240504-wfm9zsdc4v 10

General

  • Target

    foxiware.exe

  • Size

    7.3MB

  • Sample

    240504-wfm9zsdc4v

  • MD5

    0e36611a9e400947ba5a6b26f1995980

  • SHA1

    5f1c097e741cf400d57c3f288ebdd7ffef82e035

  • SHA256

    c5071d7d68e1d0c1d82fff78467dc68e6930801304bebe8831975650684a385a

  • SHA512

    fdb4e5ccbda48b84b95209259495c856fd6f8984403e1b420244fad80492d01049f6aef2af946178bf9646d4751c3fd8cda798ed7ddd5eea23c868c09734040b

  • SSDEEP

    196608:qrO+YS62iOshoKMuIkhVastRL5Di3uh1D7JD:oYS1iOshouIkPftRL54YRJD

Malware Config

Targets

    • Target

      foxiware.exe

    • Size

      7.3MB

    • MD5

      0e36611a9e400947ba5a6b26f1995980

    • SHA1

      5f1c097e741cf400d57c3f288ebdd7ffef82e035

    • SHA256

      c5071d7d68e1d0c1d82fff78467dc68e6930801304bebe8831975650684a385a

    • SHA512

      fdb4e5ccbda48b84b95209259495c856fd6f8984403e1b420244fad80492d01049f6aef2af946178bf9646d4751c3fd8cda798ed7ddd5eea23c868c09734040b

    • SSDEEP

      196608:qrO+YS62iOshoKMuIkhVastRL5Di3uh1D7JD:oYS1iOshouIkPftRL54YRJD

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks