General

  • Target

    ImageLoggerSetup.exe

  • Size

    6.9MB

  • Sample

    240511-cyxrlaba27

  • MD5

    a2763a748314da5eea6608f683eec8b3

  • SHA1

    03bf00859e8afd5c569bce3759871152c81b1e4c

  • SHA256

    236248455d1b7373481d12db61c5d45fe8bfaef120ff04e0047a51d08adde1f3

  • SHA512

    b497b3ea754c21bb48f543e903a3cba15e316116752444fb6ac4870002598efe85e8ccb02617d7de97ecc785dc41dae7539bbbef9cb0475d7fecdbef7e889636

  • SSDEEP

    98304:trl/DjWM8JEE1rBamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRGYKJJcGhEIn:trl/0seNTfm/pf+xk4dWRGtrbWOjgWyI

Malware Config

Targets

    • Target

      ImageLoggerSetup.exe

    • Size

      6.9MB

    • MD5

      a2763a748314da5eea6608f683eec8b3

    • SHA1

      03bf00859e8afd5c569bce3759871152c81b1e4c

    • SHA256

      236248455d1b7373481d12db61c5d45fe8bfaef120ff04e0047a51d08adde1f3

    • SHA512

      b497b3ea754c21bb48f543e903a3cba15e316116752444fb6ac4870002598efe85e8ccb02617d7de97ecc785dc41dae7539bbbef9cb0475d7fecdbef7e889636

    • SSDEEP

      98304:trl/DjWM8JEE1rBamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRGYKJJcGhEIn:trl/0seNTfm/pf+xk4dWRGtrbWOjgWyI

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks