General

  • Target

    GEN_TOKEN.exe

  • Size

    18.9MB

  • Sample

    240525-tr1cksag28

  • MD5

    3e7bcc413d8fbee684989878b6644ad2

  • SHA1

    ce5c61bee5ab93664a0929fb1b2817ad032aee54

  • SHA256

    6515e3d79cbac945ecd5cc28c7592a69c947006a315cc0332cb50c03833ed20b

  • SHA512

    7f32a6f53ed4271f95eb34625dcf872cb53e7ea040950c271c416a475ae5106415cd3ab0575d040816c3daf416854de48f320946047e4a72752a2011f895b0ca

  • SSDEEP

    393216:zEkZQVPP8AxYDwdQusl+l99oWOv+9UUgHw4MeUFMsE:zhQV8XsdQu/DorvSUjHBtOMs

Malware Config

Targets

    • Target

      GEN_TOKEN.exe

    • Size

      18.9MB

    • MD5

      3e7bcc413d8fbee684989878b6644ad2

    • SHA1

      ce5c61bee5ab93664a0929fb1b2817ad032aee54

    • SHA256

      6515e3d79cbac945ecd5cc28c7592a69c947006a315cc0332cb50c03833ed20b

    • SHA512

      7f32a6f53ed4271f95eb34625dcf872cb53e7ea040950c271c416a475ae5106415cd3ab0575d040816c3daf416854de48f320946047e4a72752a2011f895b0ca

    • SSDEEP

      393216:zEkZQVPP8AxYDwdQusl+l99oWOv+9UUgHw4MeUFMsE:zhQV8XsdQu/DorvSUjHBtOMs

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks