General

  • Target

    AutoDox.exe

  • Size

    14.5MB

  • Sample

    240510-by7q5aed46

  • MD5

    3c4c29f2d567b20a7a95d64fb362c887

  • SHA1

    e5e0437e756644dfddd7fa240f0453e81ba0ebcf

  • SHA256

    4a057afcc17d079c4687fced9b5bf135b9e3502252846c1bd4d26c4fd8807940

  • SHA512

    02621ce8dc804fedc5a3f0b6494f94fd95c7174e3a82101f2ff1d5476d14432a376c371f325c86f1b8f31d9fd0f6585765c625179edfa0316153c921ae854bd5

  • SSDEEP

    393216:6xfdQuslN/m3pqq9AJ4ZoWOv+9fPV4aHJCI5ctyIk10:6RdQu4KhS4ZorvS3bCI50yIk10

Malware Config

Targets

    • Target

      AutoDox.exe

    • Size

      14.5MB

    • MD5

      3c4c29f2d567b20a7a95d64fb362c887

    • SHA1

      e5e0437e756644dfddd7fa240f0453e81ba0ebcf

    • SHA256

      4a057afcc17d079c4687fced9b5bf135b9e3502252846c1bd4d26c4fd8807940

    • SHA512

      02621ce8dc804fedc5a3f0b6494f94fd95c7174e3a82101f2ff1d5476d14432a376c371f325c86f1b8f31d9fd0f6585765c625179edfa0316153c921ae854bd5

    • SSDEEP

      393216:6xfdQuslN/m3pqq9AJ4ZoWOv+9fPV4aHJCI5ctyIk10:6RdQu4KhS4ZorvS3bCI50yIk10

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks