General

  • Target

    Tempures AIO.rar

  • Size

    17.5MB

  • Sample

    240925-a5kphavcqr

  • MD5

    12d05d13cfb22e0e901f80155401bcd0

  • SHA1

    9c08ed6678f0552e7f30f5c378ffa32d2bf7e486

  • SHA256

    e062e6b7d962b03c463343bbd2718bb9568e46a426aba5aa4ed7a0fd16c38345

  • SHA512

    1a7e9faf2f8646b175d23f8f82adf76ca06b8f72bc29ed98ed49e1331499a1e514e557b61d2201146ae21fd6593896ea931b2be18412f131eb4f5c279b4e4f13

  • SSDEEP

    393216:Ov2DDV/4IrycP27J/HiZDCB1GT/sLum4xXhtQIp++:d4IGcPwfilCB8gLz4xXH4+

Malware Config

Targets

    • Target

      Tempures AIO/Tempures AIO.exe

    • Size

      17.7MB

    • MD5

      47ad76dbcb2c5970a617a4ef712d58f8

    • SHA1

      13569ba9b07253b2bde28c6904f016c612e729cc

    • SHA256

      c1a614e2ba7f27666cc26793524a32ce86bdda86a2a765eb42c6f24c17c52156

    • SHA512

      616dd0e8c85f938f38ed5e884f9a1dbe768d7043bafbe464d96bb062296eac03a4af5eb2df279d8706db98b7b3fd51e9a627534496623fd764fe864838b0d358

    • SSDEEP

      393216:ZqPnLFXlreQpDOETgsvfGFwYgziOsvEkckCDZq:QPLFXNeQoEkWrng

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks