Resubmissions

12/05/2024, 05:17

240512-fyv5jsdg26 8

12/05/2024, 05:14

240512-fw4znsdf33 8

General

  • Target

    cheatprivmta.rar

  • Size

    5.8MB

  • Sample

    240512-fyv5jsdg26

  • MD5

    2f8a3266ac3ccf927816dadec72de770

  • SHA1

    fb007dd7e31fa330b360e9faa91cc81b295f213b

  • SHA256

    6b902595ec68b1a7fc83da72d013e083fff1a4e147de826cd8c6e0a2c0fa3588

  • SHA512

    591d98bed18ae476d3b5724970cb3b7d47db9d65a9df3a4e6ab3e7fa47a23f8af7f946a1623a2cff17d7fa996d3a81fba9625fbb6ba6fe63f4c90fb3d15f5f32

  • SSDEEP

    98304:BKCu7O/1wfLQPIw73dZAt0kb+uNr7v8y1I+2r3MonrbiPNgbxD+eHNBTpYro6jyS:buy/4O/dZ++uNr7vNRRorbiP8xDfNBTK

Malware Config

Targets

    • Target

      cheatprivmta.rar

    • Size

      5.8MB

    • MD5

      2f8a3266ac3ccf927816dadec72de770

    • SHA1

      fb007dd7e31fa330b360e9faa91cc81b295f213b

    • SHA256

      6b902595ec68b1a7fc83da72d013e083fff1a4e147de826cd8c6e0a2c0fa3588

    • SHA512

      591d98bed18ae476d3b5724970cb3b7d47db9d65a9df3a4e6ab3e7fa47a23f8af7f946a1623a2cff17d7fa996d3a81fba9625fbb6ba6fe63f4c90fb3d15f5f32

    • SSDEEP

      98304:BKCu7O/1wfLQPIw73dZAt0kb+uNr7v8y1I+2r3MonrbiPNgbxD+eHNBTpYro6jyS:buy/4O/dZ++uNr7vNRRorbiP8xDfNBTK

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks