General

  • Target

    Spoofer.exe

  • Size

    10.3MB

  • Sample

    240727-lg9t9szhnl

  • MD5

    4f8a0da4c9fd2aa83a2d5b6c70eb067b

  • SHA1

    f9666cfc362bb6a193cd36e52068101fe1f92401

  • SHA256

    873e38a26e2f530ae512aae20e42bd611cd72ad7e1796aa1d1d6832679be938e

  • SHA512

    166ff8a648b85dd84fe73d9c6aafc639cbf5644681ad6c0ed50f231e7b32dc240781f3b34676a21a5abdeab79a4252e9570c7716c49656801a4612190ae6877b

  • SSDEEP

    196608:gwUEkYcowuLIRBA1HeT39Iigwh1ncKOVVtc97tqtQ1NjOx74U:AEkYcXxq1+TtIiFv0VQxg6Cl

Malware Config

Targets

    • Target

      Spoofer.exe

    • Size

      10.3MB

    • MD5

      4f8a0da4c9fd2aa83a2d5b6c70eb067b

    • SHA1

      f9666cfc362bb6a193cd36e52068101fe1f92401

    • SHA256

      873e38a26e2f530ae512aae20e42bd611cd72ad7e1796aa1d1d6832679be938e

    • SHA512

      166ff8a648b85dd84fe73d9c6aafc639cbf5644681ad6c0ed50f231e7b32dc240781f3b34676a21a5abdeab79a4252e9570c7716c49656801a4612190ae6877b

    • SSDEEP

      196608:gwUEkYcowuLIRBA1HeT39Iigwh1ncKOVVtc97tqtQ1NjOx74U:AEkYcXxq1+TtIiFv0VQxg6Cl

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks