General

  • Target

    SyprTool.exe

  • Size

    18.7MB

  • Sample

    240904-r3a6qascmp

  • MD5

    4e52de32664ce60619149f18feeef99d

  • SHA1

    d86dd3a3c51eb638303eb1f2c9781b5a471a177c

  • SHA256

    e2d7dea69bfde2dc6ab569b06838e24342bb3a6d5d0e6e1cba20c140ce987962

  • SHA512

    16ff12cf4483e686a6a05d6ccb896f466aa1f1f7b5dfeb1d92e1393b6aa57967e6ff688481cba43fa569fc9dc7a3363005de8894f4a386df6a36c1ac3c69da80

  • SSDEEP

    393216:qqPnLFXlrjQpDOETgsvfGPgvE1uTdDoigMX3lPC:/PLFXNjQoEK2E27tX

Malware Config

Targets

    • Target

      SyprTool.exe

    • Size

      18.7MB

    • MD5

      4e52de32664ce60619149f18feeef99d

    • SHA1

      d86dd3a3c51eb638303eb1f2c9781b5a471a177c

    • SHA256

      e2d7dea69bfde2dc6ab569b06838e24342bb3a6d5d0e6e1cba20c140ce987962

    • SHA512

      16ff12cf4483e686a6a05d6ccb896f466aa1f1f7b5dfeb1d92e1393b6aa57967e6ff688481cba43fa569fc9dc7a3363005de8894f4a386df6a36c1ac3c69da80

    • SSDEEP

      393216:qqPnLFXlrjQpDOETgsvfGPgvE1uTdDoigMX3lPC:/PLFXNjQoEK2E27tX

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks