General

  • Target

    EXT.exe

  • Size

    17.2MB

  • Sample

    240615-av97eawfjm

  • MD5

    cc6f02b774b0961ceb94a8a4834ca04a

  • SHA1

    13a71dda01a40c8c92c2414e88fa5fe5ad5e8f19

  • SHA256

    0b3fcce21c7df51cd88bbfb9de77e17bafd85e8614b30d2f7fcb90624fd2e8c7

  • SHA512

    f47882eebf1074940f7d8b2e236fc96feaa3aa5e143af77a1b98bdd57b65abcab42127830f0b65d42ffb63087e9e71503585d00e22dba645029d200c21573e8f

  • SSDEEP

    393216:nEk/+4uSQUJWQsUcR4NzQW+eGQRe9jo7BGeiGH1mzrwrFeOC3MALY:n3+RnUYQFIW+e5Re9M/swraLY

Malware Config

Targets

    • Target

      EXT.exe

    • Size

      17.2MB

    • MD5

      cc6f02b774b0961ceb94a8a4834ca04a

    • SHA1

      13a71dda01a40c8c92c2414e88fa5fe5ad5e8f19

    • SHA256

      0b3fcce21c7df51cd88bbfb9de77e17bafd85e8614b30d2f7fcb90624fd2e8c7

    • SHA512

      f47882eebf1074940f7d8b2e236fc96feaa3aa5e143af77a1b98bdd57b65abcab42127830f0b65d42ffb63087e9e71503585d00e22dba645029d200c21573e8f

    • SSDEEP

      393216:nEk/+4uSQUJWQsUcR4NzQW+eGQRe9jo7BGeiGH1mzrwrFeOC3MALY:n3+RnUYQFIW+e5Re9M/swraLY

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks