General

  • Target

    main.exe

  • Size

    18.5MB

  • Sample

    240912-qmjx9awgpj

  • MD5

    a455b5b294af4fdea0b14e6efa43dbdc

  • SHA1

    593ef1bf3093b486011dace4e23f44812b5043f4

  • SHA256

    cfa44b61be09b33da4deac02a581e7627d20940b484d3b08db926f9473e3a360

  • SHA512

    fe7ee273ba7c5f7764a3349336f4bddfe55d54ed5a43cedf49843484a11ff182f6edb375fe9707eb79daa87ff37097e126480219645e6ac4cc3ec5db7b3aaa97

  • SSDEEP

    393216:iqPnLFXlrPrQ8DOETgs77fGVgK+vET/m956Bgqq:nPLFXNjQhE7Kd3rm6q

Malware Config

Targets

    • Target

      main.exe

    • Size

      18.5MB

    • MD5

      a455b5b294af4fdea0b14e6efa43dbdc

    • SHA1

      593ef1bf3093b486011dace4e23f44812b5043f4

    • SHA256

      cfa44b61be09b33da4deac02a581e7627d20940b484d3b08db926f9473e3a360

    • SHA512

      fe7ee273ba7c5f7764a3349336f4bddfe55d54ed5a43cedf49843484a11ff182f6edb375fe9707eb79daa87ff37097e126480219645e6ac4cc3ec5db7b3aaa97

    • SSDEEP

      393216:iqPnLFXlrPrQ8DOETgs77fGVgK+vET/m956Bgqq:nPLFXNjQhE7Kd3rm6q

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks