General

  • Target

    R6_lVl10_1.exe

  • Size

    17.8MB

  • Sample

    240513-za7m8acf8w

  • MD5

    d7fa92ab4c3e8857d0c43521e042f7c4

  • SHA1

    4d83e45d3eed6a2086354cd428781b3a855e9428

  • SHA256

    fb8e5c7cb548ecaba397d678d51861acc6a5234448d91605586a34b8b677c4a1

  • SHA512

    dab71b2024409129365e0a463ae887a0c8477ab1edfca34136c2fa7c94052474fa497aa38b674660accfcdfb2be03c3ed9577b753165622d21a24217e689024f

  • SSDEEP

    393216:tqPnLFXlrPmQ8DOETgsvfGzgvmPvvE0BxosIaq:0PLFXNOQhEum20Cor

Malware Config

Targets

    • Target

      R6_lVl10_1.exe

    • Size

      17.8MB

    • MD5

      d7fa92ab4c3e8857d0c43521e042f7c4

    • SHA1

      4d83e45d3eed6a2086354cd428781b3a855e9428

    • SHA256

      fb8e5c7cb548ecaba397d678d51861acc6a5234448d91605586a34b8b677c4a1

    • SHA512

      dab71b2024409129365e0a463ae887a0c8477ab1edfca34136c2fa7c94052474fa497aa38b674660accfcdfb2be03c3ed9577b753165622d21a24217e689024f

    • SSDEEP

      393216:tqPnLFXlrPmQ8DOETgsvfGzgvmPvvE0BxosIaq:0PLFXNOQhEum20Cor

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks