General

  • Target

    Linora_CRACKED.exe

  • Size

    16.6MB

  • Sample

    240620-vn9mhsycla

  • MD5

    1f9bc038e66b954bcc13b752abe78579

  • SHA1

    9f8463376a82a6e3cceb51c8b68bfb0952460b4b

  • SHA256

    406331dd8a462b21734ac4194bdad5552f38246813a5647f601eff46569bb4a0

  • SHA512

    2cab1664f683452923c3dac41e992861162972ebaf9b32a3eafb91555a0fdddc2126c110d8f000357ce7c174f79521ccd5f18d114c858b5cfbc162c96895851b

  • SSDEEP

    393216:BEkcqndL01+l+uq+Vvz1+TtIiFvY9Z8D8Ccl6lnrbdLPv8wQgKrC:BkcR01+l+uqgvz1QtI6a8DZcIlrbdr3o

Malware Config

Targets

    • Target

      Linora_CRACKED.exe

    • Size

      16.6MB

    • MD5

      1f9bc038e66b954bcc13b752abe78579

    • SHA1

      9f8463376a82a6e3cceb51c8b68bfb0952460b4b

    • SHA256

      406331dd8a462b21734ac4194bdad5552f38246813a5647f601eff46569bb4a0

    • SHA512

      2cab1664f683452923c3dac41e992861162972ebaf9b32a3eafb91555a0fdddc2126c110d8f000357ce7c174f79521ccd5f18d114c858b5cfbc162c96895851b

    • SSDEEP

      393216:BEkcqndL01+l+uq+Vvz1+TtIiFvY9Z8D8Ccl6lnrbdLPv8wQgKrC:BkcR01+l+uqgvz1QtI6a8DZcIlrbdr3o

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks