General

  • Target

    exposeme.exe

  • Size

    17.8MB

  • Sample

    240525-q8v8eafc68

  • MD5

    77279c9eb90441ed563912b644c59f8d

  • SHA1

    e36fe816d1556fea3cef7a3de98274244d146f8c

  • SHA256

    2db0fa6485f648a47477e5d8bffbb7eda0d4c098bdb87bea4ff92ab4436853ab

  • SHA512

    8e34010ed3783d46777d55db50fc40f6a3404d6637c486f93078826fc8548439979d6a7ed6b56f0386adf4cc3d0cccc15c0da267cf88ba78245a88949dd5377f

  • SSDEEP

    393216:+u7L/Zpszf490ULgtIGb/m3pjYXIn7wmgoJl47sN+9NrG/:+CLTszfm0U0ttbKjY+gy4Z9Nr

Malware Config

Targets

    • Target

      exposeme.exe

    • Size

      17.8MB

    • MD5

      77279c9eb90441ed563912b644c59f8d

    • SHA1

      e36fe816d1556fea3cef7a3de98274244d146f8c

    • SHA256

      2db0fa6485f648a47477e5d8bffbb7eda0d4c098bdb87bea4ff92ab4436853ab

    • SHA512

      8e34010ed3783d46777d55db50fc40f6a3404d6637c486f93078826fc8548439979d6a7ed6b56f0386adf4cc3d0cccc15c0da267cf88ba78245a88949dd5377f

    • SSDEEP

      393216:+u7L/Zpszf490ULgtIGb/m3pjYXIn7wmgoJl47sN+9NrG/:+CLTszfm0U0ttbKjY+gy4Z9Nr

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      serverPass.pyc

    • Size

      7KB

    • MD5

      dc4a16d65d81bf294aab30d2d931ac9d

    • SHA1

      08887513f2aa527613bf48df57cd91ad55f4e141

    • SHA256

      1e6a8274064baaf1953ecd90489445ee5556d37836cc2e15ccbd37b90463c91d

    • SHA512

      b8b32b7513a4500a1a61956d0812d3b626d49d48b3ca359e83b07d52f61dca644e0ee4ed05d2342b0eb14864746c1bedc686713d3e821ba99225e580f373c0fa

    • SSDEEP

      96:nN9ejkndwDl5DMR/WadbVGMHgsw8xVBRqi1m2JRAdhe1olEJHkasuf0zk8zufbSD:n/ykndwDZ+pbHACX8sgAh5P8zjBmy9

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks