General

  • Target

    SiberiaProgDriver.exe

  • Size

    17.6MB

  • Sample

    240904-r4c2pstdmc

  • MD5

    07df29e05e2c11644c48bba28d5e7df8

  • SHA1

    b5e27732707d931249fc3e4d1e2cc9f31558d07c

  • SHA256

    0c5720fb2a64cc6b0ff1503c01bc3f3192b0f9f5109dace56347824de80c84fc

  • SHA512

    9b48a9cdaf5f7718512ba4a0cdde32c644efc7053c44c69e16bb9425a2d656f9f4c193b48708b762156f93876591f0c763878962dc50f0bc4ea39a74cb2fd70f

  • SSDEEP

    393216:p3EkNZJlhZ2YsHFUK2Jn1+TtIiFqCuARuAUFXmvJyi9Irs7O/:1FnZ2YwUlJn1QtI1CuAEIJyPZ

Malware Config

Targets

    • Target

      SiberiaProgDriver.exe

    • Size

      17.6MB

    • MD5

      07df29e05e2c11644c48bba28d5e7df8

    • SHA1

      b5e27732707d931249fc3e4d1e2cc9f31558d07c

    • SHA256

      0c5720fb2a64cc6b0ff1503c01bc3f3192b0f9f5109dace56347824de80c84fc

    • SHA512

      9b48a9cdaf5f7718512ba4a0cdde32c644efc7053c44c69e16bb9425a2d656f9f4c193b48708b762156f93876591f0c763878962dc50f0bc4ea39a74cb2fd70f

    • SSDEEP

      393216:p3EkNZJlhZ2YsHFUK2Jn1+TtIiFqCuARuAUFXmvJyi9Irs7O/:1FnZ2YwUlJn1QtI1CuAEIJyPZ

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks