General

  • Target

    OctoSniff.exe

  • Size

    6.0MB

  • Sample

    240721-x5hlgatbjr

  • MD5

    0894741902cd438c52718f429518c863

  • SHA1

    0b736dae71076915db53dc58fa74982fdb1aa6d4

  • SHA256

    e33421cb655cd14340cf2a9b10c681070227684fe980b461b29ef072281103cf

  • SHA512

    5fe12f167c052cb5e0df05cacb9d41f988615544cb86ab475f7b6bf56870be88b937770aeacd69b99a03a1940a75a4202285716f2f817991f1439495ab60e87e

  • SSDEEP

    98304:EbEtdFBCyqamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R4OuAKlLI6yv:ESFIweN/FJMIDJf0gsAGK4RzuAKl0Jv

Malware Config

Targets

    • Target

      OctoSniff.exe

    • Size

      6.0MB

    • MD5

      0894741902cd438c52718f429518c863

    • SHA1

      0b736dae71076915db53dc58fa74982fdb1aa6d4

    • SHA256

      e33421cb655cd14340cf2a9b10c681070227684fe980b461b29ef072281103cf

    • SHA512

      5fe12f167c052cb5e0df05cacb9d41f988615544cb86ab475f7b6bf56870be88b937770aeacd69b99a03a1940a75a4202285716f2f817991f1439495ab60e87e

    • SSDEEP

      98304:EbEtdFBCyqamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R4OuAKlLI6yv:ESFIweN/FJMIDJf0gsAGK4RzuAKl0Jv

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks