General

  • Target

    Quartine-v2.exe

  • Size

    17.8MB

  • Sample

    240906-wzhhva1elm

  • MD5

    d5c7ace652e7718326d62eaa1cccebcc

  • SHA1

    5272582d29fe906c535b3b6b1841382b03250a04

  • SHA256

    486996e85b29004346711f49483f8bfc2868d23369aac3af0403faac3417ca04

  • SHA512

    4c0717f813731c66b0fbbae77197720f2e79045a22ea4666d176691182da35bd467de4ece67f5d183cf7cb7591dbab6cbd5c083a6cb8e13a0cd29861eb4aa6ae

  • SSDEEP

    393216:nqPnLFXlreQ8DOETgsvfGANg9CfvEiqds/irLq:qPLFXNeQhEh4CkVG/5

Malware Config

Targets

    • Target

      Quartine-v2.exe

    • Size

      17.8MB

    • MD5

      d5c7ace652e7718326d62eaa1cccebcc

    • SHA1

      5272582d29fe906c535b3b6b1841382b03250a04

    • SHA256

      486996e85b29004346711f49483f8bfc2868d23369aac3af0403faac3417ca04

    • SHA512

      4c0717f813731c66b0fbbae77197720f2e79045a22ea4666d176691182da35bd467de4ece67f5d183cf7cb7591dbab6cbd5c083a6cb8e13a0cd29861eb4aa6ae

    • SSDEEP

      393216:nqPnLFXlreQ8DOETgsvfGANg9CfvEiqds/irLq:qPLFXNeQhEh4CkVG/5

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks