General

  • Target

    En1gma.tech1.exe

  • Size

    18.6MB

  • Sample

    240922-gzyshawajh

  • MD5

    53d8b2fdc3b75ad9c7b7283396627e58

  • SHA1

    0885954b70b0550f64107f5dee071127f290a3bc

  • SHA256

    5c81a6d78f2c569cad4606a40d47eeb55e5f6d990bffaed709a8daa579ea6837

  • SHA512

    863b95a224351eca98f27b457bcd7daba6070944c543585a50f7e36a2b54eb9608d55acb39397ead377705b1db0d35a7280797edc041d3bf1beac5d138df5f8f

  • SSDEEP

    393216:SqPnLFXlrzQ+DOETgs77fGJgsztvEZmyhVqnq:XPLFXNzQ/E7CL2hhz

Malware Config

Targets

    • Target

      En1gma.tech1.exe

    • Size

      18.6MB

    • MD5

      53d8b2fdc3b75ad9c7b7283396627e58

    • SHA1

      0885954b70b0550f64107f5dee071127f290a3bc

    • SHA256

      5c81a6d78f2c569cad4606a40d47eeb55e5f6d990bffaed709a8daa579ea6837

    • SHA512

      863b95a224351eca98f27b457bcd7daba6070944c543585a50f7e36a2b54eb9608d55acb39397ead377705b1db0d35a7280797edc041d3bf1beac5d138df5f8f

    • SSDEEP

      393216:SqPnLFXlrzQ+DOETgs77fGJgsztvEZmyhVqnq:XPLFXNzQ/E7CL2hhz

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks