General

  • Target

    Rockie_Gen.rar

  • Size

    15.9MB

  • Sample

    240621-a6hljaxhrl

  • MD5

    73ea72ec670dbf3f83f16110fecdf8d3

  • SHA1

    88f8e2c51169d9cf4581ea500d2e7b483f9c24ee

  • SHA256

    8980b576da83884c82fea54e5cd25f00d7d7d16852bcb5d3c59789a5ff4a1272

  • SHA512

    5f02de46b88f5d6c53bbccb19e3b4507e2405f5c9672072cf533d947db724ca1b6c7dd7376a6b1120b275cf154ded2188e61349d89f1ba329c3f595ac9506c1f

  • SSDEEP

    393216:QBCrwkSfSltiC5jQmSLCK+PWVeiy7O08KDpJeNms3rZ:aCWfcblSLCP0y6aJ/sbZ

Malware Config

Targets

    • Target

      main.exe

    • Size

      16.0MB

    • MD5

      7bbfb8d2359f13dab444803e9a0fd5e0

    • SHA1

      bd5896b6d3e1576567db303de9c1d6ae35a86b2d

    • SHA256

      9855b51749951297120268dcef92442bddc39c8374c2e8edbe4e80fcddc09966

    • SHA512

      150d66304c01d000d74f550c34ba475422a028171df160962faa60391b49d59a39533aeb9a4affc4de44f3a1f2ba0e622cf1d1e92d0b6dc72c47179b387a568c

    • SSDEEP

      393216:zlPiKyPxsHjFofQo5xHSdX30GVrSVSJ3QJIIg++462:zlKlZ6mYsx0rVrdJ3qgw62

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks