General

  • Target

    Haze.exe

  • Size

    17.8MB

  • Sample

    240915-r3rhpsyhkr

  • MD5

    433efee5db09ea238f28697339d07260

  • SHA1

    56c8fba88e664a1e9879ddbbf6cac5de36f5942c

  • SHA256

    352b9f1db183d6a5d7db31473080b59a7800c85b76a423db712a38b33eddf8fc

  • SHA512

    e6178d0c3c14ce580b8cab5a0b5b52aad15f2399b67570b2b5bc53c0d50e23fef34e0b2477ce0740f1bc3550b94d3ffb1c6c2095522376a8f08a0e94d28ef050

  • SSDEEP

    393216:jqPnLFXlrPmQ8DOETgsvfGFugvZP3vE41oJ3Giaq:mPLFXNOQhEDmtcDJ9

Malware Config

Targets

    • Target

      Haze.exe

    • Size

      17.8MB

    • MD5

      433efee5db09ea238f28697339d07260

    • SHA1

      56c8fba88e664a1e9879ddbbf6cac5de36f5942c

    • SHA256

      352b9f1db183d6a5d7db31473080b59a7800c85b76a423db712a38b33eddf8fc

    • SHA512

      e6178d0c3c14ce580b8cab5a0b5b52aad15f2399b67570b2b5bc53c0d50e23fef34e0b2477ce0740f1bc3550b94d3ffb1c6c2095522376a8f08a0e94d28ef050

    • SSDEEP

      393216:jqPnLFXlrPmQ8DOETgsvfGFugvZP3vE41oJ3Giaq:mPLFXNOQhEDmtcDJ9

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks