Resubmissions

29/08/2024, 14:42

240829-r3dlvaxbqd 7

General

  • Target

    google.exe

  • Size

    516KB

  • Sample

    240829-r3dlvaxbqd

  • MD5

    f68e0406bbcd6f7f3df4704229711cfa

  • SHA1

    b5a83a094b23b486a0e9bf1efb45d99e54e0f2f0

  • SHA256

    bac5aae48cd4e2315999d615d8a4c184425fdf298633f4f8a3ce094619b8ce23

  • SHA512

    9ffa31697eb2f924d238c779119b131cd15a9f7cfb18fe88c00c592d3f730970dac84858d41bf6524377a46a94c42d2eb30e82c481f8c9c78e89beb9f6c8854a

  • SSDEEP

    12288:ReRtBiy90vSpMoYTpZ4bAtkY9BrAX0CgIRw2ecl/g:ajiyQSpC34KkoUHwl0I

Malware Config

Targets

    • Target

      google.exe

    • Size

      516KB

    • MD5

      f68e0406bbcd6f7f3df4704229711cfa

    • SHA1

      b5a83a094b23b486a0e9bf1efb45d99e54e0f2f0

    • SHA256

      bac5aae48cd4e2315999d615d8a4c184425fdf298633f4f8a3ce094619b8ce23

    • SHA512

      9ffa31697eb2f924d238c779119b131cd15a9f7cfb18fe88c00c592d3f730970dac84858d41bf6524377a46a94c42d2eb30e82c481f8c9c78e89beb9f6c8854a

    • SSDEEP

      12288:ReRtBiy90vSpMoYTpZ4bAtkY9BrAX0CgIRw2ecl/g:ajiyQSpC34KkoUHwl0I

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks