General

  • Target

    Reaper-UWP.zip

  • Size

    16.9MB

  • Sample

    240520-21q49sba8v

  • MD5

    eb11266ed49c82f809ddb761b04437ba

  • SHA1

    2caa239bbd809f3e117ae05e11107e68272474f0

  • SHA256

    7eeec79dbd6fc1c2e2d06fcbd4cb8d71962604c5ce7a54d56beb2010c5f45507

  • SHA512

    89c371c6906a8d7430c344eccee35d2e0f1f772e17ed4f126a74a56c00f3619bad548040e18c179af6e619b8d7921cd27153ce2efe589e9e5334379714dcede2

  • SSDEEP

    196608:pgfrxG3XZWEaS0HB2OiphFYVZIee3pN20WlDLU9SGfjNy70v+zAvfj1EIanvSm1O:pSrxYI27ig3ps03rRy70lvROShoXM

Malware Config

Targets

    • Target

      Reaper-UWP/Reaper-UWP.exe

    • Size

      17.1MB

    • MD5

      1bd1be2ec93b5938d56a5b91a640ef99

    • SHA1

      5c395ef52ddc2ff86992f3304ec62e35c4dcbb3c

    • SHA256

      e7f423cc9ba35d2ea9a7d4dd98991c32058510fefca5a7bfce5026a63f52d5ed

    • SHA512

      0bc6d69f51932bb18e9c9c9615a28d5efd7c591fafaebaabaa9ec207bf846efdd1bfb220f2158a7f332f3ba6bbc42bb0318a2d97c8a0629fe811233ad467842d

    • SSDEEP

      393216:PiIE7YoPQtsEQETSpvJQ7RkrzGCJd02T:k7rPQtsEQEWphQNDj

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks