General

  • Target

    SetUpStarter.exe

  • Size

    113.3MB

  • Sample

    240523-e6rxesdh6t

  • MD5

    9f2005ee6ea204b15664b2a333aacb5a

  • SHA1

    51b0338e084d4fbe00da9056e8f9c06d62efc48d

  • SHA256

    ae16d2bfa18190f08c4c602dc325e93c2ae7fab324a6fb80766e43b077fc2523

  • SHA512

    157f02ecb43fce9ded401a6912d3134ebe122506ed718667100c98d8f23a08efcfcca031b78ca575b242689bb89ed9d000638bb53b1b7e61477310e2895df95b

  • SSDEEP

    3145728:b6gYRPSC++6y9Jidmt/VG6RmtCRlGPrFe22qHO5iY8Q80sME:uxaC4y9/5mERluouHCiAZvE

Malware Config

Targets

    • Target

      SetUpStarter.exe

    • Size

      113.3MB

    • MD5

      9f2005ee6ea204b15664b2a333aacb5a

    • SHA1

      51b0338e084d4fbe00da9056e8f9c06d62efc48d

    • SHA256

      ae16d2bfa18190f08c4c602dc325e93c2ae7fab324a6fb80766e43b077fc2523

    • SHA512

      157f02ecb43fce9ded401a6912d3134ebe122506ed718667100c98d8f23a08efcfcca031b78ca575b242689bb89ed9d000638bb53b1b7e61477310e2895df95b

    • SSDEEP

      3145728:b6gYRPSC++6y9Jidmt/VG6RmtCRlGPrFe22qHO5iY8Q80sME:uxaC4y9/5mERluouHCiAZvE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks