General

  • Target

    IDR-500000000.scr

  • Size

    1.5MB

  • Sample

    240906-j96l7swcrj

  • MD5

    c3af78c466127936893943c095f790e0

  • SHA1

    221dd79a6b446fc059e8c2a3a835d323dc7f7de3

  • SHA256

    ec7b4f45fbfc555e24bbf4b2f0e3659695a0c1b3ef5c343252e9a995d3108f4c

  • SHA512

    d50a79a13afbcd2f877874b68cd10ccdb57aabc29389a4698fa461ae5c432f912817e3bcfd15929b0dc4c8af17673871adc93a7841c52a18119d43a46fda117f

  • SSDEEP

    24576:rnmA81BdYN+ZlMbEJPALsbH65YjtPjTgiEO3DuBseKTfasKkeaYd1d6KU4i3T+X0:IvZabE7aShPZPzuZMtsaYtt9Zkb

Malware Config

Targets

    • Target

      IDR-500000000.scr

    • Size

      1.5MB

    • MD5

      c3af78c466127936893943c095f790e0

    • SHA1

      221dd79a6b446fc059e8c2a3a835d323dc7f7de3

    • SHA256

      ec7b4f45fbfc555e24bbf4b2f0e3659695a0c1b3ef5c343252e9a995d3108f4c

    • SHA512

      d50a79a13afbcd2f877874b68cd10ccdb57aabc29389a4698fa461ae5c432f912817e3bcfd15929b0dc4c8af17673871adc93a7841c52a18119d43a46fda117f

    • SSDEEP

      24576:rnmA81BdYN+ZlMbEJPALsbH65YjtPjTgiEO3DuBseKTfasKkeaYd1d6KU4i3T+X0:IvZabE7aShPZPzuZMtsaYtt9Zkb

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks