General
-
Target
BlankGrabber1.0.exe
-
Size
21.5MB
-
Sample
240823-n253xsvelq
-
MD5
77072d864926f6f003c16ff9692179b7
-
SHA1
e0d165923c8616c0140a0c06542764bc4e1a1739
-
SHA256
5135ea3c0c6de8507f9c2fc2ef9c31cc864d01c24b4096c8be1a974d426b54f9
-
SHA512
454ee43cd719812071107d6ea9ac0ae48111422cb4ad82319062cf113b7b22fab684796052aa521b5d12f83a3665f0f6508d4c6cd16bcb5fa863b659a5daca62
-
SSDEEP
393216:UqPnLFXlr4ChH79E2FXQ8DOETgs77fGvKgwZ6vE4JMTlZUWcm:1PLFXN9brFQhE73vVHTlZV
Behavioral task
behavioral1
Sample
BlankGrabber1.0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BlankGrabber1.0.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
BlankGrabber1.0.exe
-
Size
21.5MB
-
MD5
77072d864926f6f003c16ff9692179b7
-
SHA1
e0d165923c8616c0140a0c06542764bc4e1a1739
-
SHA256
5135ea3c0c6de8507f9c2fc2ef9c31cc864d01c24b4096c8be1a974d426b54f9
-
SHA512
454ee43cd719812071107d6ea9ac0ae48111422cb4ad82319062cf113b7b22fab684796052aa521b5d12f83a3665f0f6508d4c6cd16bcb5fa863b659a5daca62
-
SSDEEP
393216:UqPnLFXlr4ChH79E2FXQ8DOETgs77fGvKgwZ6vE4JMTlZUWcm:1PLFXN9brFQhE73vVHTlZV
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1