General

  • Target

    Last Version

  • Size

    13B

  • Sample

    240523-bneycsgb6x

  • MD5

    84a1ae99563192abd7ff4b205e90c8ea

  • SHA1

    326cbc7544a465c1be08664cafbf0ed08426403c

  • SHA256

    4a0550073688e75d4fca9ba028846ed16cd88d855428f8244f7f907691934eed

  • SHA512

    b0fb70baa7781783d9c38245d5d2d91f6b976fbd1bcc412f94effdd2eea100131bafaebe85eef524e0a669455606cdeddaaf94ac7e6658fe6aeb9fd93b6cc574

Malware Config

Targets

    • Target

      Last Version

    • Size

      13B

    • MD5

      84a1ae99563192abd7ff4b205e90c8ea

    • SHA1

      326cbc7544a465c1be08664cafbf0ed08426403c

    • SHA256

      4a0550073688e75d4fca9ba028846ed16cd88d855428f8244f7f907691934eed

    • SHA512

      b0fb70baa7781783d9c38245d5d2d91f6b976fbd1bcc412f94effdd2eea100131bafaebe85eef524e0a669455606cdeddaaf94ac7e6658fe6aeb9fd93b6cc574

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks