General

  • Target

    Steamplayer.exe

  • Size

    7.4MB

  • Sample

    240521-q72c2agc65

  • MD5

    72469b438d7a4e3f2e16079b6f486af4

  • SHA1

    a3249704930ccb652118399b1417019dbd97885e

  • SHA256

    35cc370b5e82f78f5d4705d4e48874ffb2181330e8735bca9629ac8a27d7b472

  • SHA512

    47e606c1b870fea19ffc56ca8d48058a64050882459c34af688de70fdf28999c3219c8ea7632505b940521531c52ef3eb1af7fb1947d8c5f8f9de46a1cc13c50

  • SSDEEP

    98304:jPeYgI6OshoKyDvuIYc5AhV+gEc4kZvRLoI0EJfNA3z5UTbyv9JTSPhlVtQo1fO:j2YmOshoKMuIkhVastRL5Di3tKqSPJO

Malware Config

Targets

    • Target

      Steamplayer.exe

    • Size

      7.4MB

    • MD5

      72469b438d7a4e3f2e16079b6f486af4

    • SHA1

      a3249704930ccb652118399b1417019dbd97885e

    • SHA256

      35cc370b5e82f78f5d4705d4e48874ffb2181330e8735bca9629ac8a27d7b472

    • SHA512

      47e606c1b870fea19ffc56ca8d48058a64050882459c34af688de70fdf28999c3219c8ea7632505b940521531c52ef3eb1af7fb1947d8c5f8f9de46a1cc13c50

    • SSDEEP

      98304:jPeYgI6OshoKyDvuIYc5AhV+gEc4kZvRLoI0EJfNA3z5UTbyv9JTSPhlVtQo1fO:j2YmOshoKMuIkhVastRL5Di3tKqSPJO

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks