Resubmissions

10-09-2024 14:24

240910-rq6rvsyhka 10

10-09-2024 14:24

240910-rqptcaxdqm 10

General

  • Target

    Hollow.nova7.4.exe

  • Size

    18.4MB

  • Sample

    240910-rq6rvsyhka

  • MD5

    0eccd228c2645b50e28cc82d81d59fbd

  • SHA1

    81f33dad7cf167c36630da3f4ba249f482523fb4

  • SHA256

    a0109b2dbaa9d58fa022090d798d800fa5edbc429a04c10e83bd833890d4cb89

  • SHA512

    d71faf3c32402756776361e01ef8f84c57e87c4a1845aec0cf67806be5ae520e1f0721e45925677beaba08c9138ac04aaeaca1e37d1b61ab59004b822e74a3e3

  • SSDEEP

    393216:qqPnLFXlr9QpDOETgs77fGaQgzxTvEu4SVjNL6q:/PLFXN9QoE7gWicdxr

Malware Config

Targets

    • Target

      Hollow.nova7.4.exe

    • Size

      18.4MB

    • MD5

      0eccd228c2645b50e28cc82d81d59fbd

    • SHA1

      81f33dad7cf167c36630da3f4ba249f482523fb4

    • SHA256

      a0109b2dbaa9d58fa022090d798d800fa5edbc429a04c10e83bd833890d4cb89

    • SHA512

      d71faf3c32402756776361e01ef8f84c57e87c4a1845aec0cf67806be5ae520e1f0721e45925677beaba08c9138ac04aaeaca1e37d1b61ab59004b822e74a3e3

    • SSDEEP

      393216:qqPnLFXlr9QpDOETgs77fGaQgzxTvEu4SVjNL6q:/PLFXN9QoE7gWicdxr

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks