General

  • Target

    sipy.exe

  • Size

    15.5MB

  • Sample

    240519-xkt4rscf42

  • MD5

    7f864172c9c2ba147afb4bfaa23a12eb

  • SHA1

    aba19ef4ec3f8133cc11f26bb187f3dc75a9c93e

  • SHA256

    2718f768e2809cda78cb7e0d70fc32b875aab6637e9a2d9cbb5a3193f9f250ca

  • SHA512

    34d1d767b004983c77804257f6735a644b9cb8bfe14044591bf7a517f2ea468d3f06880fd3a8a0d37c180cd5c5010f42bdf508e6875b08c32159699916c79517

  • SSDEEP

    393216:8o9Ddnnx8ZlaetEL+9qz8/Ck+7q3D1JF1bWXiWCUI:p9Znx6s+9q4N3D1NtVUI

Malware Config

Targets

    • Target

      sipy.exe

    • Size

      15.5MB

    • MD5

      7f864172c9c2ba147afb4bfaa23a12eb

    • SHA1

      aba19ef4ec3f8133cc11f26bb187f3dc75a9c93e

    • SHA256

      2718f768e2809cda78cb7e0d70fc32b875aab6637e9a2d9cbb5a3193f9f250ca

    • SHA512

      34d1d767b004983c77804257f6735a644b9cb8bfe14044591bf7a517f2ea468d3f06880fd3a8a0d37c180cd5c5010f42bdf508e6875b08c32159699916c79517

    • SSDEEP

      393216:8o9Ddnnx8ZlaetEL+9qz8/Ck+7q3D1JF1bWXiWCUI:p9Znx6s+9q4N3D1NtVUI

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks