General

  • Target

    BotLobby.rar

  • Size

    14.2MB

  • Sample

    240809-bcbfsstdpj

  • MD5

    62a6b88b39424b033db7bb13fadf97ac

  • SHA1

    e96806d6910b8884990ee816cba80131be706a82

  • SHA256

    a05bfbe6d72fdb7bbf2d3fc4cae634f319c1e90f746bb49338833b6f5ed5c221

  • SHA512

    ca4aed1ce56fc2ec94bbd0c6dce9531982635856107816b7f980ec5b3cee910832d96dcdb69d36b8df3128f387d755c9413dbd604c9ba9bc054a9495b7152b09

  • SSDEEP

    393216:vbliOiDWoCI2Msi0x9F9UJr7WFhVF4Nob7Zdro3T:ToOiDWoH25i0ExUwYZN+

Malware Config

Targets

    • Target

      Botlobby.exe

    • Size

      14.4MB

    • MD5

      a7d3b205c86fe21a3032d9a63429be23

    • SHA1

      018202c85fbcb56dd35b2383cad728d48de2fff6

    • SHA256

      b7853963eea3ed2d67761d6b6319b9e83318ffcf554fd91d9ac62ce0fa37cc86

    • SHA512

      6d7d6cd9475d501a873d2b38dc6311c2bb66f91c365eb6d874e4bf444e1210c668bfcc8e1826501b27671aeb8301d0ee8135f12ec7fb73b8d18f509d9a9786ed

    • SSDEEP

      393216:kiIE7YoPQJidQuslSq99oWOv+9fg9aIQjAG:97rPQwdQuSDorvSY9a5A

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks