General

  • Target

    Setup.exe

  • Size

    18.8MB

  • Sample

    240925-zhd1wawhpp

  • MD5

    a8a687806803236207190b8d2924c8e2

  • SHA1

    4982051c289eb54e46d22013edf74b2c5f69933c

  • SHA256

    3e4afcd4d33ed9295f63463bad1bfa73efad7e2440d25e0865c551ae7e47b74c

  • SHA512

    84d5454e2808ae30d381e339eaa3148fc66c1bd41d98032f28fd13b1dc8b4b6ad5ea6ff2df47a4c9d3633ce4bb0d3f85316bee7a959d0536c96f884d6b4c31da

  • SSDEEP

    393216:AqPnLFXlrLBQ+DOETgsvfG9CgdB9pvE4nJtfpyrm:BPLFXNLBQ/E5KBgetfj

Malware Config

Targets

    • Target

      Setup.exe

    • Size

      18.8MB

    • MD5

      a8a687806803236207190b8d2924c8e2

    • SHA1

      4982051c289eb54e46d22013edf74b2c5f69933c

    • SHA256

      3e4afcd4d33ed9295f63463bad1bfa73efad7e2440d25e0865c551ae7e47b74c

    • SHA512

      84d5454e2808ae30d381e339eaa3148fc66c1bd41d98032f28fd13b1dc8b4b6ad5ea6ff2df47a4c9d3633ce4bb0d3f85316bee7a959d0536c96f884d6b4c31da

    • SSDEEP

      393216:AqPnLFXlrLBQ+DOETgsvfG9CgdB9pvE4nJtfpyrm:BPLFXNLBQ/E5KBgetfj

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks