General

  • Target

    VbucksGen.exe

  • Size

    7.4MB

  • Sample

    240526-f1wtvshb73

  • MD5

    7cf97cd1e3890a05c57551b4c3046b34

  • SHA1

    1b76cafa2c94a141c877718a3ef566f68f71e2ad

  • SHA256

    68d721907ebd5beb7d1a0222b948550006d710be9dc2e7899204f73464da7664

  • SHA512

    0c72fe05473126d2f1d9c4491cd6c3c0baa5246200d04b4dcb0ca2a809b5188331e5fbe28d8cc7df96a5028c026d5f9557688c1cd84d65dcca7a77b198082adf

  • SSDEEP

    196608:hrd/eurErvI9pWjgyvoaYrE41JIuINO/Vn:feurEUWjdo/H1JHNn

Malware Config

Targets

    • Target

      VbucksGen.exe

    • Size

      7.4MB

    • MD5

      7cf97cd1e3890a05c57551b4c3046b34

    • SHA1

      1b76cafa2c94a141c877718a3ef566f68f71e2ad

    • SHA256

      68d721907ebd5beb7d1a0222b948550006d710be9dc2e7899204f73464da7664

    • SHA512

      0c72fe05473126d2f1d9c4491cd6c3c0baa5246200d04b4dcb0ca2a809b5188331e5fbe28d8cc7df96a5028c026d5f9557688c1cd84d65dcca7a77b198082adf

    • SSDEEP

      196608:hrd/eurErvI9pWjgyvoaYrE41JIuINO/Vn:feurEUWjdo/H1JHNn

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks