General

  • Target

    stealer.exe

  • Size

    18.6MB

  • Sample

    240902-vbs41atgml

  • MD5

    7d8ad7e8476a36bb3851f542800a6709

  • SHA1

    4276b12c13487389f2ed31a07024489750f9092e

  • SHA256

    3d30ffd98e870abc0e09fb3af94d65fc8efd391ede958dd0365007a7ae020ec0

  • SHA512

    cc0cf625649b94646fc023089ad7bf809018f0ae8b654a5461191a308043b6f1f02a14c3c66504e32caf0be71134face69f49b025f9eb4bb0a32d8c775a12001

  • SSDEEP

    393216:KqPnLFXlrIIQ8DOETgsmlfGVgcW6vEZpqCiDmqq:fPLFXNRQhEvzWTiCia

Malware Config

Targets

    • Target

      stealer.exe

    • Size

      18.6MB

    • MD5

      7d8ad7e8476a36bb3851f542800a6709

    • SHA1

      4276b12c13487389f2ed31a07024489750f9092e

    • SHA256

      3d30ffd98e870abc0e09fb3af94d65fc8efd391ede958dd0365007a7ae020ec0

    • SHA512

      cc0cf625649b94646fc023089ad7bf809018f0ae8b654a5461191a308043b6f1f02a14c3c66504e32caf0be71134face69f49b025f9eb4bb0a32d8c775a12001

    • SSDEEP

      393216:KqPnLFXlrIIQ8DOETgsmlfGVgcW6vEZpqCiDmqq:fPLFXNRQhEvzWTiCia

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks