General

  • Target

    Executor.zip

  • Size

    20.0MB

  • Sample

    240720-ryh1rs1cpm

  • MD5

    68c772d05567680642a9b2a11e922f81

  • SHA1

    ac924d5dc70a4716149462efcb619b008e08c52e

  • SHA256

    a447347ab99092c34518e47c6036590081a7c181887e246a8857705228b918df

  • SHA512

    06a0271d4c1cb4c1360cb343017a8fa19ee076c117a01f8021241c77b2c7f9120dd1961f747b70b0f342383f35c860a32d5c93b5615838abe02dd75e4bccdc46

  • SSDEEP

    393216:dgv1dJSHLXdEJ65ACVyKuYfUhyoPu9NhDlu6K88MjnXyMmgyPRydOy:dgvHJSz7ugNxcXU/3Xyol

Malware Config

Targets

    • Target

      Executor/Bootstrapper.exe

    • Size

      250.0MB

    • MD5

      d4f626f5507fc59ea251a228d8ca62e9

    • SHA1

      0940b9e5b2edea6bdf7c91e60e3f25eb1a39c735

    • SHA256

      952d76c83f6f13406c4c4e7cd0ceff1f108d04d05ef245e9f75c5d358ea775bf

    • SHA512

      0564cdf4c5b6971080b16f0d14a3195e9806914d7afcf05319ddfed27a71ba41eed3c7589f80adbfc7f29aaf57613d58d277b81400404ac7fca6b508ebf813ce

    • SSDEEP

      12288:U+wg3bVRqBlNozAAgP3g9sg/OKepymtDL5anQ95r8Un1MaRkGkwmhITCwXx4pCZb:Uzg3h+o7gP3Sov5Rq

    Score
    7/10
    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks