General

  • Target

    ColorBotWaloranti.exe

  • Size

    14.1MB

  • Sample

    240830-varjsathnh

  • MD5

    03e85d213f7da865cda0803202b63948

  • SHA1

    543436410eec2d5d070568ab19940f4b85acc7b1

  • SHA256

    badc92fc3b900d25ae7552956298aec99270bd339087cffe03ec251cf74778bc

  • SHA512

    4517d314585a7f037e35b93c36cb48ac859f757dfb10b09818135dc7d397d2b11a9f9bb31c403c79151ff0871d8a75ab91c2451c71040b644658091fd6acbd39

  • SSDEEP

    393216:hqPuYXJEf/m3phqm7QfXCOpuHSe5wX79iAv:IPuYXJEfKhqjPQSlRL

Malware Config

Targets

    • Target

      ColorBotWaloranti.exe

    • Size

      14.1MB

    • MD5

      03e85d213f7da865cda0803202b63948

    • SHA1

      543436410eec2d5d070568ab19940f4b85acc7b1

    • SHA256

      badc92fc3b900d25ae7552956298aec99270bd339087cffe03ec251cf74778bc

    • SHA512

      4517d314585a7f037e35b93c36cb48ac859f757dfb10b09818135dc7d397d2b11a9f9bb31c403c79151ff0871d8a75ab91c2451c71040b644658091fd6acbd39

    • SSDEEP

      393216:hqPuYXJEf/m3phqm7QfXCOpuHSe5wX79iAv:IPuYXJEfKhqjPQSlRL

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks