General

  • Target

    MM2ccDuper.exe

  • Size

    16.2MB

  • Sample

    240528-tnlp1sbd4y

  • MD5

    c468d50f656a15c78c24a71d28b89cc6

  • SHA1

    c189a35a462d86a4deeae99b6385d0921c4cad36

  • SHA256

    b31748ca0afdbf16e0bf795d6f0ca03f0b6530ec4971045db2f4aaf4897be581

  • SHA512

    62915921a377cd4d9eb697248052c86179d51e1829fa165674c3cc7a5c09112476b36f56805db6201b43f332d545439554a43afb31f34d57ad74d6ab014e6e52

  • SSDEEP

    393216:sv90+5gDkTh2Jp5MwurEUWjsrz7E5PKk9buK+x:69PvThidb8z7bkEK+

Malware Config

Targets

    • Target

      MM2ccDuper.exe

    • Size

      16.2MB

    • MD5

      c468d50f656a15c78c24a71d28b89cc6

    • SHA1

      c189a35a462d86a4deeae99b6385d0921c4cad36

    • SHA256

      b31748ca0afdbf16e0bf795d6f0ca03f0b6530ec4971045db2f4aaf4897be581

    • SHA512

      62915921a377cd4d9eb697248052c86179d51e1829fa165674c3cc7a5c09112476b36f56805db6201b43f332d545439554a43afb31f34d57ad74d6ab014e6e52

    • SSDEEP

      393216:sv90+5gDkTh2Jp5MwurEUWjsrz7E5PKk9buK+x:69PvThidb8z7bkEK+

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks