General

  • Target

    MWIIICheatAIM.exe

  • Size

    17.8MB

  • Sample

    240821-sknjrsvgqe

  • MD5

    77b8066fa7fadae0a4ccf7c322d57fc4

  • SHA1

    8c2bf86aaacf17952eb6cb08cd2bc42fc09394b2

  • SHA256

    04d0d974cd06c30dbe2aa191afb990aa38344911d0126bfd3e1482e8190ee9cd

  • SHA512

    aee54bc80971f17454603e434df4c48e758bfc33d2cd1ebc85d083fe6db369964c5d962f7f747272f83156d1120007d27d6b0bb9df80178a12af086241fa9962

  • SSDEEP

    393216:iqPnLFXlreQ8DOETgsvfGFkgj2YLm7vEk3z8YYL2q:nPLFXNeQhEjI2YLmgQwY+

Malware Config

Targets

    • Target

      MWIIICheatAIM.exe

    • Size

      17.8MB

    • MD5

      77b8066fa7fadae0a4ccf7c322d57fc4

    • SHA1

      8c2bf86aaacf17952eb6cb08cd2bc42fc09394b2

    • SHA256

      04d0d974cd06c30dbe2aa191afb990aa38344911d0126bfd3e1482e8190ee9cd

    • SHA512

      aee54bc80971f17454603e434df4c48e758bfc33d2cd1ebc85d083fe6db369964c5d962f7f747272f83156d1120007d27d6b0bb9df80178a12af086241fa9962

    • SSDEEP

      393216:iqPnLFXlreQ8DOETgsvfGFkgj2YLm7vEk3z8YYL2q:nPLFXNeQhEjI2YLmgQwY+

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks