General

  • Target

    ScriptHub.exe

  • Size

    17.8MB

  • Sample

    240922-hen81awemp

  • MD5

    3447c2466991cbf2ddc24626fb1fa01e

  • SHA1

    d9ccc0b5814027a9dc93de2289e836130bf07ed2

  • SHA256

    4c3439af56505c801aa5155eb4995998bf36f565963d4664b825b53509b9d970

  • SHA512

    62d83cb44b84aa1ec3a476de0e3a50d738e3d28e80a942633ea6ab78e2970a2958f1933ca582a682ee439dee6f7351ea2102a3c7c930fddd8014604c739ec4eb

  • SSDEEP

    393216:YqPnLFXlriQ8DOETgsvfGFYgEwjvEelFLtM2q:JPLFXNiQhEx8IMLy

Malware Config

Targets

    • Target

      ScriptHub.exe

    • Size

      17.8MB

    • MD5

      3447c2466991cbf2ddc24626fb1fa01e

    • SHA1

      d9ccc0b5814027a9dc93de2289e836130bf07ed2

    • SHA256

      4c3439af56505c801aa5155eb4995998bf36f565963d4664b825b53509b9d970

    • SHA512

      62d83cb44b84aa1ec3a476de0e3a50d738e3d28e80a942633ea6ab78e2970a2958f1933ca582a682ee439dee6f7351ea2102a3c7c930fddd8014604c739ec4eb

    • SSDEEP

      393216:YqPnLFXlriQ8DOETgsvfGFYgEwjvEelFLtM2q:JPLFXNiQhEx8IMLy

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks