General
-
Target
BrowserUpdater.vhd
-
Size
6.0MB
-
Sample
240806-yzbfmssgqc
-
MD5
5714c27e55d82b9ff9d92c04eee9570e
-
SHA1
78484dac3651e19d92bbd717769c696cae5da1ba
-
SHA256
1e3c17c2b74ad7d0e3f646ec9fe2a5bb6bd9a2f5a2cf02c02fc4b5d432dede69
-
SHA512
a63f236285d98375b904dddc1fa4db4ccbd7988b00f19690127bd93cbe7f759ed7fe80b0b4d1d1e4d86384c5f8496e7b80e9dc1e75692c68e3b7f7834a472189
-
SSDEEP
96:fYgvmJUX3S7OkUX3S7OdyHywJOSk58/AQcsgffVxfA2NrXl:fFvuUnS7vUnS7GyHfJOSk5aAQlglJ
Static task
static1
Behavioral task
behavioral1
Sample
BrowserUpdater.lnk
Resource
win7-20240729-en
Malware Config
Extracted
https://redr.me/g3boil/
Extracted
https://redr.me/g3boil/
Targets
-
-
Target
BrowserUpdater.lnk
-
Size
2KB
-
MD5
7ed0b7e22f568d2eedaf956ba831d0a6
-
SHA1
c073465e6ca109f2069f2e26f28525e66da54bee
-
SHA256
7a6ad3868f0223896ceea378a056b2568ad6f6ca2e65baaa7b55e1033da3abd7
-
SHA512
c718e67fb2554d7bbbac60a1a3dae6fe6bcdf4c06c0cababd8b623d52f1d306f9441c27deaaff269e129fb0dcecb17430480b1941b14d95a01d3ffd4c87887cd
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1