General

  • Target

    main.exe

  • Size

    22.0MB

  • Sample

    240521-zkh3lsaa4z

  • MD5

    170b7234f8d7df16ed6e659049db63ed

  • SHA1

    833c48eff2b8536f46f9b715e4c42a19a27aa82e

  • SHA256

    5cdf1db70a350238910f8ca65d6b9330b36945fb22bb04c8ef9f58ae8e9b649c

  • SHA512

    9f64508108ca34ce42123dc11b557c42efcbb64fdf412a378bc4dafca7d442845ef1bb828822e71c6569fd595716c6dc7a6e509ad037f5f63f812e8bdc496986

  • SSDEEP

    393216:WqPnLFXlrFugQG3DOETgs7NR8GZgNzUMOHsZBr8bXbHTvBbvByr:7PLFXNF7QGiE7vioM9HG7zZor

Malware Config

Targets

    • Target

      main.exe

    • Size

      22.0MB

    • MD5

      170b7234f8d7df16ed6e659049db63ed

    • SHA1

      833c48eff2b8536f46f9b715e4c42a19a27aa82e

    • SHA256

      5cdf1db70a350238910f8ca65d6b9330b36945fb22bb04c8ef9f58ae8e9b649c

    • SHA512

      9f64508108ca34ce42123dc11b557c42efcbb64fdf412a378bc4dafca7d442845ef1bb828822e71c6569fd595716c6dc7a6e509ad037f5f63f812e8bdc496986

    • SSDEEP

      393216:WqPnLFXlrFugQG3DOETgs7NR8GZgNzUMOHsZBr8bXbHTvBbvByr:7PLFXNF7QGiE7vioM9HG7zZor

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks