General

  • Target

    1a65b424303544e62ef96ad72e311d59b540746b397d7ac1518db96212b5cc40

  • Size

    2.3MB

  • Sample

    240602-wax71aaf92

  • MD5

    82a2c8b40869774186e5e2740d8b40fa

  • SHA1

    def495427e6eb7f077ba3b899d616cbc0ee9d843

  • SHA256

    1a65b424303544e62ef96ad72e311d59b540746b397d7ac1518db96212b5cc40

  • SHA512

    e70e201b7d074f70c2a03a37cd3d0c2b2a38819a3ad6df92f135735b4ccc95fd38a40614d719c6dbebc16af11fd8f636b240cd872060e2a432cecc6dba94ea98

  • SSDEEP

    49152:TazkgLSy3/lzCjrsaziVwKcgFHwakqXfd+/9AF0aRER0vNgt:TaYgLdEuTkqXf0F7ewkQ

Malware Config

Targets

    • Target

      1a65b424303544e62ef96ad72e311d59b540746b397d7ac1518db96212b5cc40

    • Size

      2.3MB

    • MD5

      82a2c8b40869774186e5e2740d8b40fa

    • SHA1

      def495427e6eb7f077ba3b899d616cbc0ee9d843

    • SHA256

      1a65b424303544e62ef96ad72e311d59b540746b397d7ac1518db96212b5cc40

    • SHA512

      e70e201b7d074f70c2a03a37cd3d0c2b2a38819a3ad6df92f135735b4ccc95fd38a40614d719c6dbebc16af11fd8f636b240cd872060e2a432cecc6dba94ea98

    • SSDEEP

      49152:TazkgLSy3/lzCjrsaziVwKcgFHwakqXfd+/9AF0aRER0vNgt:TaYgLdEuTkqXf0F7ewkQ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks