General

  • Target

    builder.exe

  • Size

    14.3MB

  • Sample

    240619-wfhdqszfmn

  • MD5

    0ad57b220794fa7ea977c2febf932710

  • SHA1

    fea4a079c63ac9c12efbd7e6e04d19d6cd8819a5

  • SHA256

    f41530b3fa407d4ad80f76356f939b85d70b0b95858608de8149c0e54331eeca

  • SHA512

    d420e8694d7c4209a0beff7927616053258858e04c2eba2000a30ced1721c96741a6b143a7a70edd882380a38608ccd874c376e4ceadcf0d47269fb060784a1b

  • SSDEEP

    393216:ku7L/sQQdQuslSq9RoWOv+9fggR6iM40Fe:kCL0QQdQuSborvSYgor9F

Malware Config

Targets

    • Target

      builder.exe

    • Size

      14.3MB

    • MD5

      0ad57b220794fa7ea977c2febf932710

    • SHA1

      fea4a079c63ac9c12efbd7e6e04d19d6cd8819a5

    • SHA256

      f41530b3fa407d4ad80f76356f939b85d70b0b95858608de8149c0e54331eeca

    • SHA512

      d420e8694d7c4209a0beff7927616053258858e04c2eba2000a30ced1721c96741a6b143a7a70edd882380a38608ccd874c376e4ceadcf0d47269fb060784a1b

    • SSDEEP

      393216:ku7L/sQQdQuslSq9RoWOv+9fggR6iM40Fe:kCL0QQdQuSborvSYgor9F

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks