Resubmissions

25-09-2024 00:05

240925-adjywswdpc 10

24-09-2024 20:28

240924-y8yyastenp 10

General

  • Target

    celex.exe

  • Size

    21.7MB

  • Sample

    240924-y8yyastenp

  • MD5

    aa0d7c2af38268e140ca4b335d795623

  • SHA1

    85ca5f016eda3c341f016065e85e9140a6aa4913

  • SHA256

    0c185d738ea3ce27331b0c14c16ed9488ae39547e322582ed4e47c5bc61289fd

  • SHA512

    de04dbd940fdf08fcc5f798226ea115dd8498778bfbb5019638e6a8f1221708adb83fbd2e9da7ec49ce8192f181ecda75e0507768a0b1557a4e0d6daf423774f

  • SSDEEP

    393216:5qPnLFXlraQSWsgIDOEEgsvcGugGEVpMpDm0Jh6gj+G9s:wPLFXNaQS3gNvc3EsfrjO

Malware Config

Targets

    • Target

      celex.exe

    • Size

      21.7MB

    • MD5

      aa0d7c2af38268e140ca4b335d795623

    • SHA1

      85ca5f016eda3c341f016065e85e9140a6aa4913

    • SHA256

      0c185d738ea3ce27331b0c14c16ed9488ae39547e322582ed4e47c5bc61289fd

    • SHA512

      de04dbd940fdf08fcc5f798226ea115dd8498778bfbb5019638e6a8f1221708adb83fbd2e9da7ec49ce8192f181ecda75e0507768a0b1557a4e0d6daf423774f

    • SSDEEP

      393216:5qPnLFXlraQSWsgIDOEEgsvcGugGEVpMpDm0Jh6gj+G9s:wPLFXNaQS3gNvc3EsfrjO

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks