General

  • Target

    main.exe

  • Size

    17.8MB

  • Sample

    240815-y74gdssdph

  • MD5

    23f147b7a40fafe0d2e443a5645b23bf

  • SHA1

    428669b002bbb4dbb96d6af1a8fbe5b762ee332d

  • SHA256

    a91a80883275df0e61bfc851f942bb55ecff9fb08781812c2989021546c904e0

  • SHA512

    f5893aa6369d3fac2b9410ec201d5fb46fe83a864a267d3d7ae762e7a47e620e33eb66c95a7e2c91abbf30a72b1c61d77ccef55ca6ddc642b3bfc247aacc2fec

  • SSDEEP

    393216:iqPnLFXlriQ8DOETgsvfGFgrg1iOvETAB+qqgKq:nPLFXNiQhEQPm8Yq7

Malware Config

Targets

    • Target

      main.exe

    • Size

      17.8MB

    • MD5

      23f147b7a40fafe0d2e443a5645b23bf

    • SHA1

      428669b002bbb4dbb96d6af1a8fbe5b762ee332d

    • SHA256

      a91a80883275df0e61bfc851f942bb55ecff9fb08781812c2989021546c904e0

    • SHA512

      f5893aa6369d3fac2b9410ec201d5fb46fe83a864a267d3d7ae762e7a47e620e33eb66c95a7e2c91abbf30a72b1c61d77ccef55ca6ddc642b3bfc247aacc2fec

    • SSDEEP

      393216:iqPnLFXlriQ8DOETgsvfGFgrg1iOvETAB+qqgKq:nPLFXNiQhEQPm8Yq7

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks