General

  • Target

    4fight.exe

  • Size

    17.8MB

  • Sample

    240817-qn8m1axfjc

  • MD5

    4db7ad7407c0f3df5de72b9fdde81aef

  • SHA1

    63b0df59d93286834e0010c8c31220a32a12fb55

  • SHA256

    d76a5cde5d29c99b1023e11177d5514b373d66e0b2911fe7a96a2a74f9845fd8

  • SHA512

    b4345f5dc341fde2ded47fb4323afecb4768bb1a92cde518c599c9e7c53afd280541015c74c91c3297fc44b00d3bd4cec23dc69a60f900316d543ebe5fa11ded

  • SSDEEP

    393216:DqPnLFXlrPmQ8DOETgsvfGFrgvRXXvEicH8yZevq:GPLFXNOQhEUmRMiXyb

Malware Config

Targets

    • Target

      4fight.exe

    • Size

      17.8MB

    • MD5

      4db7ad7407c0f3df5de72b9fdde81aef

    • SHA1

      63b0df59d93286834e0010c8c31220a32a12fb55

    • SHA256

      d76a5cde5d29c99b1023e11177d5514b373d66e0b2911fe7a96a2a74f9845fd8

    • SHA512

      b4345f5dc341fde2ded47fb4323afecb4768bb1a92cde518c599c9e7c53afd280541015c74c91c3297fc44b00d3bd4cec23dc69a60f900316d543ebe5fa11ded

    • SSDEEP

      393216:DqPnLFXlrPmQ8DOETgsvfGFrgvRXXvEicH8yZevq:GPLFXNOQhEUmRMiXyb

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks