Resubmissions

21-05-2024 19:45

240521-ygjpasgd72 10

21-05-2024 19:38

240521-ycqxtagd4s 10

General

  • Target

    a‮txt.exe

  • Size

    17.8MB

  • Sample

    240521-ygjpasgd72

  • MD5

    f280f8903aa3bf1e162a29de1b733eea

  • SHA1

    946db0cb4234f64e78e6659c5fe3ec9778dc2ace

  • SHA256

    51b57c7e001923ef2dcc3c2cda5c0e4e2250f3fcdfb008d3bab44e2324dbb4e0

  • SHA512

    4b3a84f757ab908e6bd0df9459caa05b96bd341eaf2b19992137bf3e639629e202e00caa8582a1e2642f564f0c5dbf39010fc9e144937053a3113f11e42bc3b4

  • SSDEEP

    393216:JKqPnLFXlrPmQ8DOETgsvfGFmgUa85r7vEkBQbquiCq:lPLFXNOQhEHXa8lgnbqJ

Malware Config

Targets

    • Target

      a‮txt.exe

    • Size

      17.8MB

    • MD5

      f280f8903aa3bf1e162a29de1b733eea

    • SHA1

      946db0cb4234f64e78e6659c5fe3ec9778dc2ace

    • SHA256

      51b57c7e001923ef2dcc3c2cda5c0e4e2250f3fcdfb008d3bab44e2324dbb4e0

    • SHA512

      4b3a84f757ab908e6bd0df9459caa05b96bd341eaf2b19992137bf3e639629e202e00caa8582a1e2642f564f0c5dbf39010fc9e144937053a3113f11e42bc3b4

    • SSDEEP

      393216:JKqPnLFXlrPmQ8DOETgsvfGFmgUa85r7vEkBQbquiCq:lPLFXNOQhEHXa8lgnbqJ

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks