General

  • Target

    Charow.exe

  • Size

    62.4MB

  • Sample

    240616-zqjw4a1fpm

  • MD5

    40a4b9668de52092f5eef20775d9b57f

  • SHA1

    192e04f2c4b090f804be306f4280a521830306d3

  • SHA256

    0aff087928d14356155c8106b1942a5938c54f9341368cdaf77bed71f0656ca3

  • SHA512

    2bb4e70820b1dcb141ad1678ac78d6d48f4629c65635e70bb7066f21b557e6dc9b0cf3e64c7ad526303bf9ad03a258326572f7433178375ac64ab169cbcb3f1f

  • SSDEEP

    1572864:nm6fAPvMbBMBL2nQygZNbvZrfFYC7jVdleLWiHx6w2W7N7fNJ:m6fivCM9UgbBFYWRH8WiHX3pJ

Score
10/10

Malware Config

Targets

    • Target

      Charow.exe

    • Size

      62.4MB

    • MD5

      40a4b9668de52092f5eef20775d9b57f

    • SHA1

      192e04f2c4b090f804be306f4280a521830306d3

    • SHA256

      0aff087928d14356155c8106b1942a5938c54f9341368cdaf77bed71f0656ca3

    • SHA512

      2bb4e70820b1dcb141ad1678ac78d6d48f4629c65635e70bb7066f21b557e6dc9b0cf3e64c7ad526303bf9ad03a258326572f7433178375ac64ab169cbcb3f1f

    • SSDEEP

      1572864:nm6fAPvMbBMBL2nQygZNbvZrfFYC7jVdleLWiHx6w2W7N7fNJ:m6fivCM9UgbBFYWRH8WiHX3pJ

    Score
    10/10
    • Epsilon Stealer

      Information stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      Charow.exe

    • Size

      140.1MB

    • MD5

      635241963c80f1b340c65dfd306f554e

    • SHA1

      859bab3fbcc146b573f20d9a42104fa15cd1a1f8

    • SHA256

      50136550410d93d341dc6fadc1e895c8d661f46c11f4dae4aabcd9c553399f3b

    • SHA512

      56ddb69e1d6f0d4309911c1549c45a11f7b6afda4529e266d8ea3620041742f381edb6e5acac031cf1cdd57b1c7b5c2877751bd3e5d19bd357ecfef7b829b70d

    • SSDEEP

      1572864:42Cm7gJKfVjsPawuFHNwczWTeMkF7ZEk8bCkKbj:/aodJFek8+k

    Score
    10/10
    • Epsilon Stealer

      Information stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks