General

  • Target

    9N7sz7

  • Size

    518B

  • Sample

    240525-vqtzvaca22

  • MD5

    2c2630a826960140fd1328551b2c9d15

  • SHA1

    6ea4ac0f64f606b6ee62919ed7ba78e4506f41c9

  • SHA256

    1e4d2d68d1d02a7f6c73e29c693fd4021cd45931b3f99b68244d49fdcbc89515

  • SHA512

    17d8d36465993ef47193d65485d2bacac40062a48e3af193df351f54a6c2262a8cedfcd2afb58b9edd336fe76adcc9ac87abfe67e0a46bd9cc3e83735e7e7c90

Score
7/10

Malware Config

Targets

    • Target

      9N7sz7

    • Size

      518B

    • MD5

      2c2630a826960140fd1328551b2c9d15

    • SHA1

      6ea4ac0f64f606b6ee62919ed7ba78e4506f41c9

    • SHA256

      1e4d2d68d1d02a7f6c73e29c693fd4021cd45931b3f99b68244d49fdcbc89515

    • SHA512

      17d8d36465993ef47193d65485d2bacac40062a48e3af193df351f54a6c2262a8cedfcd2afb58b9edd336fe76adcc9ac87abfe67e0a46bd9cc3e83735e7e7c90

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks