General

  • Target

    Lithium-Nuker-V2.exe

  • Size

    18.2MB

  • Sample

    240626-nkhajasemf

  • MD5

    59532c79ededb7008c69016fde693f0b

  • SHA1

    0eb0141237e3772adbae53655cefc01d0e8b7c0f

  • SHA256

    ae57fb7f1fbb32ce8265575d1ed01f2e5d26c92664ed255511e66478cfe2848c

  • SHA512

    f6c309602a5dd0c993678487d1b1a99b976ede79563605e4e63dd4a04551098cf64557cf3515c362730a8a647f27021aab189f57b5c5afa52564c64dadf7eaf3

  • SSDEEP

    393216:7hjsQtspjQETS/vJQ7L8AbVykTTA7X31uk:JsQtsdQEW/hQXpsSCl

Malware Config

Targets

    • Target

      Lithium-Nuker-V2.exe

    • Size

      18.2MB

    • MD5

      59532c79ededb7008c69016fde693f0b

    • SHA1

      0eb0141237e3772adbae53655cefc01d0e8b7c0f

    • SHA256

      ae57fb7f1fbb32ce8265575d1ed01f2e5d26c92664ed255511e66478cfe2848c

    • SHA512

      f6c309602a5dd0c993678487d1b1a99b976ede79563605e4e63dd4a04551098cf64557cf3515c362730a8a647f27021aab189f57b5c5afa52564c64dadf7eaf3

    • SSDEEP

      393216:7hjsQtspjQETS/vJQ7L8AbVykTTA7X31uk:JsQtsdQEW/hQXpsSCl

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Target

      log.pyc

    • Size

      9KB

    • MD5

      fc9c451b97415cc1df14311f65869440

    • SHA1

      dbca1e2eeba5f1a10c9237130de6407274bbaa28

    • SHA256

      a33d5b3f343bc047c2f9bd7f8b859dfe6618056b4eec273cf10bcc9d3134cb4b

    • SHA512

      345ad52164031559129742547787b551a357afd589bcd7115220378c5ad0f4fbd0c1c86a45a296033d9f6b1c57f304452f00ac622e6c4b5d4a12bcc753439563

    • SSDEEP

      192:imTZv/C1S3gfpT0gVdBeVyYoKRpmILplUEkmU635UQeY:nZqfp4gVmVyY7pblUEkmUsUA

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks