General

  • Target

    https://cdn.discordapp.com/attachments/1239151699722108948/1239153384603389982/FIXV2.exe?ex=66545805&is=66530685&hm=4465b3c436d1a02592040ba17dca7d717236d81304ea5008b47647f43e18563f&

  • Sample

    240526-l9cegafd99

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1239151699722108948/1239153384603389982/FIXV2.exe?ex=66545805&is=66530685&hm=4465b3c436d1a02592040ba17dca7d717236d81304ea5008b47647f43e18563f&

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks