General

  • Target

    MechaSpooferFREE.exe

  • Size

    21.0MB

  • Sample

    240817-lxs7fszbpe

  • MD5

    1b1b64ec2689896f4ce7ce8a777783d9

  • SHA1

    1fd42be82ba3637fc484e716ee9e1ad1b982cea8

  • SHA256

    699544dfbc6d90cc7b078a24306d493491049f65f5b11295f04c4a84f361e4b8

  • SHA512

    c158d166898163f6e83d8000b4a169a4d5bba2de828ca8335251a73b2fdcfe2022123a232b4f4b4bed36a3a4e28293f691e69d2c6deac36571439e7cc289145a

  • SSDEEP

    393216:mqPnLFXlrVIxBZgQpDOETgs77/G9mwgz4j2XUqvT5gb3wOFqwuveb:LPLFXNWyQoE7Eg8+UM5VOcwuW

Malware Config

Targets

    • Target

      MechaSpooferFREE.exe

    • Size

      21.0MB

    • MD5

      1b1b64ec2689896f4ce7ce8a777783d9

    • SHA1

      1fd42be82ba3637fc484e716ee9e1ad1b982cea8

    • SHA256

      699544dfbc6d90cc7b078a24306d493491049f65f5b11295f04c4a84f361e4b8

    • SHA512

      c158d166898163f6e83d8000b4a169a4d5bba2de828ca8335251a73b2fdcfe2022123a232b4f4b4bed36a3a4e28293f691e69d2c6deac36571439e7cc289145a

    • SSDEEP

      393216:mqPnLFXlrVIxBZgQpDOETgs77/G9mwgz4j2XUqvT5gb3wOFqwuveb:LPLFXNWyQoE7Eg8+UM5VOcwuW

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks