General

  • Target

    bR5aGGV8ks.exe

  • Size

    20.0MB

  • Sample

    240507-tz2wdaha98

  • MD5

    2e566403f2c3813ed52dddd4ac1cd081

  • SHA1

    2ccd728b76d4ca5ca290bbc0dfb62c9344fa9fdb

  • SHA256

    5a09fbfd6e993ae21c440e32e06dadf96c0ba1fd50c452827c944f87718a6964

  • SHA512

    2ffc6e4893b81d27e4a4d4dbf0075f511bb715cd352ec06a9054ccd24cb8422ae61d1837105ffb549b0f65dfd04f9d969e1992a5b141c413fa9058e76cc556af

  • SSDEEP

    393216:Fv9zcQqKXG5L1V8dXurEUWjc3z9W9cD4jn60bbM2mnC:x9gQTXaRkdbc0O4b3bbLmC

Malware Config

Targets

    • Target

      bR5aGGV8ks.exe

    • Size

      20.0MB

    • MD5

      2e566403f2c3813ed52dddd4ac1cd081

    • SHA1

      2ccd728b76d4ca5ca290bbc0dfb62c9344fa9fdb

    • SHA256

      5a09fbfd6e993ae21c440e32e06dadf96c0ba1fd50c452827c944f87718a6964

    • SHA512

      2ffc6e4893b81d27e4a4d4dbf0075f511bb715cd352ec06a9054ccd24cb8422ae61d1837105ffb549b0f65dfd04f9d969e1992a5b141c413fa9058e76cc556af

    • SSDEEP

      393216:Fv9zcQqKXG5L1V8dXurEUWjc3z9W9cD4jn60bbM2mnC:x9gQTXaRkdbc0O4b3bbLmC

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks