General

  • Target

    11fec1dd71e44a811de2a7fcc259a4cab455362da64aa7c76935b64fdebd2958

  • Size

    128KB

  • Sample

    240516-xjzymaba8y

  • MD5

    78913a000732f5c08737a459487f34e3

  • SHA1

    102d1c69b4a3cbe237d91fe3e393c58b180913cb

  • SHA256

    11fec1dd71e44a811de2a7fcc259a4cab455362da64aa7c76935b64fdebd2958

  • SHA512

    d38ecec13d2910e71b38cab598045099c3bffef8a10980c66b3a2d683f44d97a59d1998f09de56318b48ffe71f200527fd0e2d8bd48965f31a39540ffbb9e1f7

  • SSDEEP

    3072:/V2A/gVh74gpgNDJmSp+SHMTgXRDGcKCq131Hr7kPU:/MAoVNkdmSlBBDjq1Br7kPU

Malware Config

Targets

    • Target

      11fec1dd71e44a811de2a7fcc259a4cab455362da64aa7c76935b64fdebd2958

    • Size

      128KB

    • MD5

      78913a000732f5c08737a459487f34e3

    • SHA1

      102d1c69b4a3cbe237d91fe3e393c58b180913cb

    • SHA256

      11fec1dd71e44a811de2a7fcc259a4cab455362da64aa7c76935b64fdebd2958

    • SHA512

      d38ecec13d2910e71b38cab598045099c3bffef8a10980c66b3a2d683f44d97a59d1998f09de56318b48ffe71f200527fd0e2d8bd48965f31a39540ffbb9e1f7

    • SSDEEP

      3072:/V2A/gVh74gpgNDJmSp+SHMTgXRDGcKCq131Hr7kPU:/MAoVNkdmSlBBDjq1Br7kPU

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks