Resubmissions

17-08-2024 07:31

240817-jcj2yatgng 10

17-08-2024 07:27

240817-h99hesxdjl 10

17-08-2024 07:22

240817-h7jh8atenf 10

General

  • Target

    Private server 4.8 (Emilia).exe

  • Size

    17.7MB

  • Sample

    240817-h7jh8atenf

  • MD5

    72c00f23fb5421eb8bb7a1843597675d

  • SHA1

    8ccea1f496be5cec0c0da4e1c5d7a2bf01f38f86

  • SHA256

    ba834fb6411121af7cc759a200f0cdf8c4be4b53d710bc7a285939e9210c7d27

  • SHA512

    d01162b5f018e05ef1c7772be7644f2ce46b9448a52004e8c9afcbf10029a13b1177167cabc868b05b17ca674bc9e90430d91b217de72ec259c7c14a1dd3d41f

  • SSDEEP

    393216:WqPnLFXlrWQ8DOETgsvfG9g5RXvEcTujKqNRq:7PLFXNWQhECqyvuR

Malware Config

Targets

    • Target

      Private server 4.8 (Emilia).exe

    • Size

      17.7MB

    • MD5

      72c00f23fb5421eb8bb7a1843597675d

    • SHA1

      8ccea1f496be5cec0c0da4e1c5d7a2bf01f38f86

    • SHA256

      ba834fb6411121af7cc759a200f0cdf8c4be4b53d710bc7a285939e9210c7d27

    • SHA512

      d01162b5f018e05ef1c7772be7644f2ce46b9448a52004e8c9afcbf10029a13b1177167cabc868b05b17ca674bc9e90430d91b217de72ec259c7c14a1dd3d41f

    • SSDEEP

      393216:WqPnLFXlrWQ8DOETgsvfG9g5RXvEcTujKqNRq:7PLFXNWQhECqyvuR

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks