General

  • Target

    wincore-dll.com.exe

  • Size

    15.6MB

  • Sample

    240720-bmyn3stbne

  • MD5

    461571c9b19dafc8ec3cf49d5b0c18d2

  • SHA1

    d798620036607df06e6acee5e0a6b27e4f31b9d6

  • SHA256

    b99cfae0221698800a666683726103763b201f74913722e5d8c9e9fe328ad2ba

  • SHA512

    efc6f60b63f2f9cc23ac89ccca4534842506c8a27c24113574718755213fbdb8b2ab0ee1da7bd6dffbde741893ead3b826af664597af4d728b12c9d9d035d0ba

  • SSDEEP

    393216:uo9DvJYctSme+7/pWbkRlH2B6eiWdp9w0P5YjaHm:P97JY6Fe+7/pW6uWOvKjaG

Malware Config

Targets

    • Target

      wincore-dll.com.exe

    • Size

      15.6MB

    • MD5

      461571c9b19dafc8ec3cf49d5b0c18d2

    • SHA1

      d798620036607df06e6acee5e0a6b27e4f31b9d6

    • SHA256

      b99cfae0221698800a666683726103763b201f74913722e5d8c9e9fe328ad2ba

    • SHA512

      efc6f60b63f2f9cc23ac89ccca4534842506c8a27c24113574718755213fbdb8b2ab0ee1da7bd6dffbde741893ead3b826af664597af4d728b12c9d9d035d0ba

    • SSDEEP

      393216:uo9DvJYctSme+7/pWbkRlH2B6eiWdp9w0P5YjaHm:P97JY6Fe+7/pW6uWOvKjaG

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks