General

  • Target

    kovaakscrackedrunasadmin.exe

  • Size

    17.8MB

  • Sample

    240922-ptjqdszfja

  • MD5

    910a994f017ceb63838dc14640a808f9

  • SHA1

    8a70d025f36c206ce16784a4c818f67a36f157ff

  • SHA256

    d6fbe0afe56a6f804f8a9d0a3e77937a409f9c15aa04cafc3a8ac308fed7d4e4

  • SHA512

    10407b9cceccdeaa4bb54097723fac28a9a93c00b093bfb4b863e8e3bc2c044665d0fe7c59874ff4d380bfe6bdecda856073f10eed82f06b71284e217c67793c

  • SSDEEP

    393216:xqPnLFXlreQ+DOETgsvfG76gVKPQvEdqzIh4Um:YPLFXNeQ/EJGKBwIo

Malware Config

Targets

    • Target

      kovaakscrackedrunasadmin.exe

    • Size

      17.8MB

    • MD5

      910a994f017ceb63838dc14640a808f9

    • SHA1

      8a70d025f36c206ce16784a4c818f67a36f157ff

    • SHA256

      d6fbe0afe56a6f804f8a9d0a3e77937a409f9c15aa04cafc3a8ac308fed7d4e4

    • SHA512

      10407b9cceccdeaa4bb54097723fac28a9a93c00b093bfb4b863e8e3bc2c044665d0fe7c59874ff4d380bfe6bdecda856073f10eed82f06b71284e217c67793c

    • SSDEEP

      393216:xqPnLFXlreQ+DOETgsvfG76gVKPQvEdqzIh4Um:YPLFXNeQ/EJGKBwIo

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks