General

  • Target

    752404c9755a198ea8a582af0a5b7f0a9457c205102cf570de24e2534a848595

  • Size

    18.6MB

  • Sample

    240902-zekdgsxfnh

  • MD5

    4ac9eb5defd0ba232d3d735895b62b1d

  • SHA1

    ae87449d1989e766b63ecaef94ed7f783e3cd740

  • SHA256

    752404c9755a198ea8a582af0a5b7f0a9457c205102cf570de24e2534a848595

  • SHA512

    a507d97a447f052307dbabb9afdd691dd95bf2e0aa4e8f7591a81fa29fc5fcdbe5b761527ebeba9cae2da59f4f3dabeacd42cd7e808c73b6bf2ff224c5c27f74

  • SSDEEP

    393216:zqPnLFXlrIIQ8DOETgsmlfG5mJgXSo7vEo6YwZXOC3bq:2PLFXNRQhEzyiSjVv+p

Malware Config

Targets

    • Target

      752404c9755a198ea8a582af0a5b7f0a9457c205102cf570de24e2534a848595

    • Size

      18.6MB

    • MD5

      4ac9eb5defd0ba232d3d735895b62b1d

    • SHA1

      ae87449d1989e766b63ecaef94ed7f783e3cd740

    • SHA256

      752404c9755a198ea8a582af0a5b7f0a9457c205102cf570de24e2534a848595

    • SHA512

      a507d97a447f052307dbabb9afdd691dd95bf2e0aa4e8f7591a81fa29fc5fcdbe5b761527ebeba9cae2da59f4f3dabeacd42cd7e808c73b6bf2ff224c5c27f74

    • SSDEEP

      393216:zqPnLFXlrIIQ8DOETgsmlfG5mJgXSo7vEo6YwZXOC3bq:2PLFXNRQhEzyiSjVv+p

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks