Resubmissions

10-09-2024 14:18

240910-rmqlgayflc 10

General

  • Target

    Hollow.nova7.4.exe

  • Size

    18.4MB

  • Sample

    240910-rmqlgayflc

  • MD5

    0eccd228c2645b50e28cc82d81d59fbd

  • SHA1

    81f33dad7cf167c36630da3f4ba249f482523fb4

  • SHA256

    a0109b2dbaa9d58fa022090d798d800fa5edbc429a04c10e83bd833890d4cb89

  • SHA512

    d71faf3c32402756776361e01ef8f84c57e87c4a1845aec0cf67806be5ae520e1f0721e45925677beaba08c9138ac04aaeaca1e37d1b61ab59004b822e74a3e3

  • SSDEEP

    393216:qqPnLFXlr9QpDOETgs77fGaQgzxTvEu4SVjNL6q:/PLFXN9QoE7gWicdxr

Malware Config

Targets

    • Target

      Hollow.nova7.4.exe

    • Size

      18.4MB

    • MD5

      0eccd228c2645b50e28cc82d81d59fbd

    • SHA1

      81f33dad7cf167c36630da3f4ba249f482523fb4

    • SHA256

      a0109b2dbaa9d58fa022090d798d800fa5edbc429a04c10e83bd833890d4cb89

    • SHA512

      d71faf3c32402756776361e01ef8f84c57e87c4a1845aec0cf67806be5ae520e1f0721e45925677beaba08c9138ac04aaeaca1e37d1b61ab59004b822e74a3e3

    • SSDEEP

      393216:qqPnLFXlr9QpDOETgs77fGaQgzxTvEu4SVjNL6q:/PLFXN9QoE7gWicdxr

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      main.pyc

    • Size

      7KB

    • MD5

      0009fff420b6a8c3491c4a5e86aedb14

    • SHA1

      930c1697b367bc1255af660e6c4d8c55997bc474

    • SHA256

      e9cfb73d310e54180b8267f2ef656428d093ca7bc78a782a42a7d4e37ac69e7f

    • SHA512

      0dc848b794e0e2aba732792b02ff7e6150dadd09721500649908bf6721de54650514aca9f41b56bbcc248f4f5fb2fedb8706b8baab767f3cee29b492394ea30b

    • SSDEEP

      192:w5RC50XP28D89qVtaZWdXwa1fb6qU+VWXEJhwmQhfNFTMdwu+Anw:N0XPsKSWusfGqYY27NFTPuHw

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks