General

  • Target

    VXLauncher.exe

  • Size

    17.8MB

  • Sample

    240908-pxt1jayfpf

  • MD5

    eae951938fffd30f009ddffa52b8db43

  • SHA1

    7a71e625fec9da029579c348276d8539d3610691

  • SHA256

    9b46f088f80a7a98d4955eeaf37bc46e826127ee4653ae9a4944260b351ad0e0

  • SHA512

    f7639976dbf893f42c601bdfaffe160557407e3127efe5f9583009ab03a98e5f88fb4c775fa6c8a3716d1b6729edc1af654acbd548cd872fbbeec82f78ea19d6

  • SSDEEP

    393216:NqPnLFXlreQ8DOETgsvfG0/gkhUvErIZlUoOq:UPLFXNeQhEb/rfglf

Malware Config

Targets

    • Target

      VXLauncher.exe

    • Size

      17.8MB

    • MD5

      eae951938fffd30f009ddffa52b8db43

    • SHA1

      7a71e625fec9da029579c348276d8539d3610691

    • SHA256

      9b46f088f80a7a98d4955eeaf37bc46e826127ee4653ae9a4944260b351ad0e0

    • SHA512

      f7639976dbf893f42c601bdfaffe160557407e3127efe5f9583009ab03a98e5f88fb4c775fa6c8a3716d1b6729edc1af654acbd548cd872fbbeec82f78ea19d6

    • SSDEEP

      393216:NqPnLFXlreQ8DOETgsvfG0/gkhUvErIZlUoOq:UPLFXNeQhEb/rfglf

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks