General

  • Target

    Plague.exe

  • Size

    10.4MB

  • Sample

    240619-naagyatdlk

  • MD5

    46bf5978a632f7ffd438ab8c96d758d7

  • SHA1

    82e94d104bb4a9b80cefe43b6ff52daa25f316b3

  • SHA256

    c4f26de64bbd6828ed5776e9492e21abf83b084794ed6f784c8eeafcaa61e1c6

  • SHA512

    9357717b41ccfaf35ed22c5418ebc8237858f033c6a162230f0784b315f9c93133a0e109465eb41e3159a8e44c42274b075b4e044036229f803e399289d27afc

  • SSDEEP

    196608:ctxEkYcowuLIoBA1HeT39Iigwh1ncKOVVtc97XEtQ1NjOp4U:MEkYcXIq1+TtIiFv0VQx060l

Malware Config

Targets

    • Target

      Plague.exe

    • Size

      10.4MB

    • MD5

      46bf5978a632f7ffd438ab8c96d758d7

    • SHA1

      82e94d104bb4a9b80cefe43b6ff52daa25f316b3

    • SHA256

      c4f26de64bbd6828ed5776e9492e21abf83b084794ed6f784c8eeafcaa61e1c6

    • SHA512

      9357717b41ccfaf35ed22c5418ebc8237858f033c6a162230f0784b315f9c93133a0e109465eb41e3159a8e44c42274b075b4e044036229f803e399289d27afc

    • SSDEEP

      196608:ctxEkYcowuLIoBA1HeT39Iigwh1ncKOVVtc97XEtQ1NjOp4U:MEkYcXIq1+TtIiFv0VQx060l

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks