General

  • Target

    Akemi-Stealer.jar

  • Size

    11.5MB

  • Sample

    240925-mnlxfstfph

  • MD5

    c91e95fe615bba6794a529ad80d4523c

  • SHA1

    ef0d7051346c3decef5928ac1faee9fe39615893

  • SHA256

    14bcf3550946e7e2467d3c1c520668295c1c7c2763aafedde0bb50e7cff3ebaf

  • SHA512

    15287a6c9f32422dff8aa69c42e4a4723e877da61aa75513532754ae98a1d95def4d8e3554a35d12c85341e53c639ba1a6dcaac6a0b2436e88db9765d20f6ab6

  • SSDEEP

    196608:JDjVsADupL4Gg3Lxdkf0O/3nOalOLuhWFoZFclXi8QJSjT0w:JjVs6upEVd7O/H0L6WFokhhcw

Score
7/10

Malware Config

Targets

    • Target

      Akemi-Stealer.jar

    • Size

      11.5MB

    • MD5

      c91e95fe615bba6794a529ad80d4523c

    • SHA1

      ef0d7051346c3decef5928ac1faee9fe39615893

    • SHA256

      14bcf3550946e7e2467d3c1c520668295c1c7c2763aafedde0bb50e7cff3ebaf

    • SHA512

      15287a6c9f32422dff8aa69c42e4a4723e877da61aa75513532754ae98a1d95def4d8e3554a35d12c85341e53c639ba1a6dcaac6a0b2436e88db9765d20f6ab6

    • SSDEEP

      196608:JDjVsADupL4Gg3Lxdkf0O/3nOalOLuhWFoZFclXi8QJSjT0w:JjVs6upEVd7O/H0L6WFokhhcw

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks