General

  • Target

    Launcher (1).exe

  • Size

    17.8MB

  • Sample

    240814-v61gkavbqa

  • MD5

    890fb03eb055d20ed35f762c4dba2fc7

  • SHA1

    fdcfb67892779546461842cc060277638b2a732a

  • SHA256

    a6ab470d4b71470f96e84363781e4a72020f0a5bc28c4ed0b57f6309b512f02c

  • SHA512

    24122367c1530a8a4c9bd1efc1ba2336ce2bbc7e0bda5ec4f3a61111d76f6dc5206142a9da0ba75f821ff1414527ba93f9fdba98aa085d865a1c57d3625495a8

  • SSDEEP

    393216:uqPnLFXlriQ8DOETgsvfGFBgcFGScvE4TydBccHJq:jPLFXNiQhEGpGSGgBcZ

Malware Config

Targets

    • Target

      Launcher (1).exe

    • Size

      17.8MB

    • MD5

      890fb03eb055d20ed35f762c4dba2fc7

    • SHA1

      fdcfb67892779546461842cc060277638b2a732a

    • SHA256

      a6ab470d4b71470f96e84363781e4a72020f0a5bc28c4ed0b57f6309b512f02c

    • SHA512

      24122367c1530a8a4c9bd1efc1ba2336ce2bbc7e0bda5ec4f3a61111d76f6dc5206142a9da0ba75f821ff1414527ba93f9fdba98aa085d865a1c57d3625495a8

    • SSDEEP

      393216:uqPnLFXlriQ8DOETgsvfGFBgcFGScvE4TydBccHJq:jPLFXNiQhEGpGSGgBcZ

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks