General

  • Target

    votatest.exe

  • Size

    17.8MB

  • Sample

    240902-wjgllsvbnl

  • MD5

    558197d1e4b7cde5444cef27aa6f4c5a

  • SHA1

    1a14836626d724d2df92c75b99976a8e8a97e713

  • SHA256

    23eb91abe15fe2bc6223c7a6a25c6aa34a38d167ef6ab2fb99a0858244c2a599

  • SHA512

    26e50296944020c2e9f00824c3c018d217acea453b3ffdcf9be5858ba3bd125c288c21270bfd3c8dd873f2a9379646458517e18961275dfed2318031132a3b13

  • SSDEEP

    393216:0qPnLFXlreQ8DOETgsvfGagLwtqPvE3W8xJkyPq:VPLFXNeQhEzgw0UmwJw

Malware Config

Targets

    • Target

      votatest.exe

    • Size

      17.8MB

    • MD5

      558197d1e4b7cde5444cef27aa6f4c5a

    • SHA1

      1a14836626d724d2df92c75b99976a8e8a97e713

    • SHA256

      23eb91abe15fe2bc6223c7a6a25c6aa34a38d167ef6ab2fb99a0858244c2a599

    • SHA512

      26e50296944020c2e9f00824c3c018d217acea453b3ffdcf9be5858ba3bd125c288c21270bfd3c8dd873f2a9379646458517e18961275dfed2318031132a3b13

    • SSDEEP

      393216:0qPnLFXlreQ8DOETgsvfGagLwtqPvE3W8xJkyPq:VPLFXNeQhEzgw0UmwJw

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks