General

  • Target

    599bf30a3f4f2db660df21c928d805bc1cf8cfba942539a96bf93666142d5bc6

  • Size

    7.9MB

  • Sample

    240526-hnwdnsae71

  • MD5

    3042e0c9cd55e2b23db9ef36e2512516

  • SHA1

    f94c8dd173f0c9d6861a52f1eb03079a331a0cf8

  • SHA256

    599bf30a3f4f2db660df21c928d805bc1cf8cfba942539a96bf93666142d5bc6

  • SHA512

    5c784fea5aff5245b5f9e2ec87130edc83e27e4691551548b609de0e9675e8bbcd3f309c08217d0205d5fa69ee921d020fd1e82c273466809487e2725d998cfa

  • SSDEEP

    196608:CS2YS6PC2XOshoKMuIkhVastRL5Di3uh1D7JW:UYS+DXOshouIkPftRL54YRJW

Malware Config

Targets

    • Target

      599bf30a3f4f2db660df21c928d805bc1cf8cfba942539a96bf93666142d5bc6

    • Size

      7.9MB

    • MD5

      3042e0c9cd55e2b23db9ef36e2512516

    • SHA1

      f94c8dd173f0c9d6861a52f1eb03079a331a0cf8

    • SHA256

      599bf30a3f4f2db660df21c928d805bc1cf8cfba942539a96bf93666142d5bc6

    • SHA512

      5c784fea5aff5245b5f9e2ec87130edc83e27e4691551548b609de0e9675e8bbcd3f309c08217d0205d5fa69ee921d020fd1e82c273466809487e2725d998cfa

    • SSDEEP

      196608:CS2YS6PC2XOshoKMuIkhVastRL5Di3uh1D7JW:UYS+DXOshouIkPftRL54YRJW

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks