General

  • Target

    NovaFixxer.exe

  • Size

    17.8MB

  • Sample

    240821-ae9kyazgna

  • MD5

    38e4ef52a2fce5fbd7726b398c54c367

  • SHA1

    75015fdaeec40c635a2a2dab6e9701ec17b336ef

  • SHA256

    7cab7a1a8d155de2cc004f1a9ea12237c5edb29ec7588cf8dfbef6f8f721ebd1

  • SHA512

    30910b63f4dca95602ac093e8db0bfe212bb8ce7f6f34070ec03ba3596de44d6f793e58e1e44c0c06a0b0bdec95ce63fb527c70fc9e0c4889d8bac567e554b18

  • SSDEEP

    393216:BqPnLFXlreQ8DOETgsvfG5gr2/nJovEmFn/18MKq:oPLFXNeQhEQKSHml1/

Malware Config

Targets

    • Target

      NovaFixxer.exe

    • Size

      17.8MB

    • MD5

      38e4ef52a2fce5fbd7726b398c54c367

    • SHA1

      75015fdaeec40c635a2a2dab6e9701ec17b336ef

    • SHA256

      7cab7a1a8d155de2cc004f1a9ea12237c5edb29ec7588cf8dfbef6f8f721ebd1

    • SHA512

      30910b63f4dca95602ac093e8db0bfe212bb8ce7f6f34070ec03ba3596de44d6f793e58e1e44c0c06a0b0bdec95ce63fb527c70fc9e0c4889d8bac567e554b18

    • SSDEEP

      393216:BqPnLFXlreQ8DOETgsvfG5gr2/nJovEmFn/18MKq:oPLFXNeQhEQKSHml1/

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks