General

  • Target

    boblox.exe

  • Size

    29.5MB

  • Sample

    240618-pxkrvsterb

  • MD5

    8b820249689f428bddfe588635422d12

  • SHA1

    504359fae7a11c95e6c7d9016470ea8ae444ffe3

  • SHA256

    a0135afc132a7f95cb5ebf4fe806806689338c50572ec36941b88b2dab5be2a7

  • SHA512

    aa52e714c9dd3b7771206e9b3156565153fbdf92b41fd1eba307eb57348688a918e8306c4f3b41e1e0a17ee1915fe1a4a0d052041a1d6a79739ca859df5e9f3c

  • SSDEEP

    786432:59SVGdbB+KvIFVOj+ESWqE5Sezpak9SFjcr:PSMdXvIFVOlqQZ8kGk

Malware Config

Targets

    • Target

      boblox.exe

    • Size

      29.5MB

    • MD5

      8b820249689f428bddfe588635422d12

    • SHA1

      504359fae7a11c95e6c7d9016470ea8ae444ffe3

    • SHA256

      a0135afc132a7f95cb5ebf4fe806806689338c50572ec36941b88b2dab5be2a7

    • SHA512

      aa52e714c9dd3b7771206e9b3156565153fbdf92b41fd1eba307eb57348688a918e8306c4f3b41e1e0a17ee1915fe1a4a0d052041a1d6a79739ca859df5e9f3c

    • SSDEEP

      786432:59SVGdbB+KvIFVOj+ESWqE5Sezpak9SFjcr:PSMdXvIFVOlqQZ8kGk

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks