General

  • Target

    aid.png

  • Size

    1.2MB

  • Sample

    240606-p3qkasfd23

  • MD5

    5fa4c64940c157dbaab12c020f7aaa85

  • SHA1

    0086d48e22e45ac20d49fde12327fec024d72d2a

  • SHA256

    0c7418baa6c3a3cf18b88bcaf53fb8b57d1b793f108d4114748091f1a725760e

  • SHA512

    e14622bb2b5aa842ef92d5c6a910513c6edce068e1b2d95d86ffda581e246d66e9b9fa0753915a0be38e258345732b216cc45366c00db7d7b9e5a1cc9e4eaed1

  • SSDEEP

    24576:B41nWfIc82HNKpo6Bh7hn/veSYwAdCsh+39HIbyf4LsKJR:CoN85/veSYLZ+39ayfKsKL

Malware Config

Targets

    • Target

      aid.png

    • Size

      1.2MB

    • MD5

      5fa4c64940c157dbaab12c020f7aaa85

    • SHA1

      0086d48e22e45ac20d49fde12327fec024d72d2a

    • SHA256

      0c7418baa6c3a3cf18b88bcaf53fb8b57d1b793f108d4114748091f1a725760e

    • SHA512

      e14622bb2b5aa842ef92d5c6a910513c6edce068e1b2d95d86ffda581e246d66e9b9fa0753915a0be38e258345732b216cc45366c00db7d7b9e5a1cc9e4eaed1

    • SSDEEP

      24576:B41nWfIc82HNKpo6Bh7hn/veSYwAdCsh+39HIbyf4LsKJR:CoN85/veSYLZ+39ayfKsKL

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks