Resubmissions

10-07-2024 17:28

240710-v2b86szfpr 8

10-07-2024 17:25

240710-vzrabazfkm 7

General

  • Target

    text.txt

  • Size

    183B

  • Sample

    240710-v2b86szfpr

  • MD5

    7d22a7c501b54f3f4c889a4c6a56c6c1

  • SHA1

    0320dce6fda62bcd576013fd0b787bb715ba64bf

  • SHA256

    0f44f6cf90b1f970e597d52a33601aa052f473ebaea67436cc181bc46e8d9650

  • SHA512

    36680a3cfdeee00d5b9ba968542e2aec43efcf4bc7c8aeb3783b4282f8bc435a830d3ec4ed9f5a545cddcf4bee2503e1920935450dbcefedd006d675e700f56a

Malware Config

Targets

    • Target

      text.txt

    • Size

      183B

    • MD5

      7d22a7c501b54f3f4c889a4c6a56c6c1

    • SHA1

      0320dce6fda62bcd576013fd0b787bb715ba64bf

    • SHA256

      0f44f6cf90b1f970e597d52a33601aa052f473ebaea67436cc181bc46e8d9650

    • SHA512

      36680a3cfdeee00d5b9ba968542e2aec43efcf4bc7c8aeb3783b4282f8bc435a830d3ec4ed9f5a545cddcf4bee2503e1920935450dbcefedd006d675e700f56a

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks