General

  • Target

    Vex Ddos.exe

  • Size

    17.8MB

  • Sample

    240830-xl97dazcre

  • MD5

    ddc4dad289d8856988feb6deea3dc695

  • SHA1

    301bc711db091e6e01a57fe510fc7befd5cef9d4

  • SHA256

    5afbb4d2427496e6a3e7a17d59cd8b3f8794022a6c24791a472ed19c78f9c58d

  • SHA512

    f9d7f6b48253b1d68ece42252d7c2719849c0e869e07547d10469484f655634ffaa40dd5aca5a1cf58af7ba188c7babc05342b86a380d9abd4ae6335ac23fa2b

  • SSDEEP

    393216:BqPnLFXlreQ8DOETgsvfGFygFMkPVvEOAfd1cOq:oPLFXNeQhETaZi1dQ

Malware Config

Targets

    • Target

      Vex Ddos.exe

    • Size

      17.8MB

    • MD5

      ddc4dad289d8856988feb6deea3dc695

    • SHA1

      301bc711db091e6e01a57fe510fc7befd5cef9d4

    • SHA256

      5afbb4d2427496e6a3e7a17d59cd8b3f8794022a6c24791a472ed19c78f9c58d

    • SHA512

      f9d7f6b48253b1d68ece42252d7c2719849c0e869e07547d10469484f655634ffaa40dd5aca5a1cf58af7ba188c7babc05342b86a380d9abd4ae6335ac23fa2b

    • SSDEEP

      393216:BqPnLFXlreQ8DOETgsvfGFygFMkPVvEOAfd1cOq:oPLFXNeQhETaZi1dQ

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks