General

  • Target

    IPTV PANEL SCANNER.zip

  • Size

    71.0MB

  • Sample

    240903-t3gpls1dkr

  • MD5

    562b2286903877e765ec278e2b1ee013

  • SHA1

    53d596933a86d9a50e548352acb600be9ff07736

  • SHA256

    47c2611f55ed40f61492ea8629b903f6babeeb15c45852dc89744d5289504702

  • SHA512

    9ff654aa01ef072dbec878619bfcf54709e828f6476bd903848ae9fe02f8c84e870aba979d925c8cc00bb7558b455bddfe6a86d2bbb89aafd5c413d9398525f9

  • SSDEEP

    1572864:Rg7KBWAgB+TqMzmENev0xv5Rc/yNidPkoH3kZIYCGdcHdWLQQNTgO:Ou9gI/zLk8xvvcKNidPko0ZImdWdGQQV

Malware Config

Targets

    • Target

      IPTV PANEL SCANNER.zip

    • Size

      71.0MB

    • MD5

      562b2286903877e765ec278e2b1ee013

    • SHA1

      53d596933a86d9a50e548352acb600be9ff07736

    • SHA256

      47c2611f55ed40f61492ea8629b903f6babeeb15c45852dc89744d5289504702

    • SHA512

      9ff654aa01ef072dbec878619bfcf54709e828f6476bd903848ae9fe02f8c84e870aba979d925c8cc00bb7558b455bddfe6a86d2bbb89aafd5c413d9398525f9

    • SSDEEP

      1572864:Rg7KBWAgB+TqMzmENev0xv5Rc/yNidPkoH3kZIYCGdcHdWLQQNTgO:Ou9gI/zLk8xvvcKNidPko0ZImdWdGQQV

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      IPTVSCANNER.exe

    • Size

      71.0MB

    • MD5

      c8251f6eee1fdba1f4cfbe7b081218d9

    • SHA1

      5d6042374c9f4e75db7b51f5a94e8acb40ad2d2e

    • SHA256

      33dcd3be575bb87a2331fa70ff0d43771ad2e00c18ee93971fa1607e12dc9c23

    • SHA512

      0c22411c906b34464cb6aac793f628682abf3e548503d1d428eec6528378a7a35208210653ea91249357d6af325da5923c68ac9854af7c2c600b9a9f874d3e1d

    • SSDEEP

      1572864:74/4rzOchPF1YKM6fz/SSx9hpmB4lqPtOARbcVqsm+PyfPUhSP3DGO7:kkqcdzBMIz1x9zmOlqPtOAuVq8PqPcKb

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks