General

  • Target

    main.exe

  • Size

    18.6MB

  • Sample

    240928-j9b3laybmc

  • MD5

    9ba87fa5ed4b8db9d1baf3f041b77106

  • SHA1

    1090cc1aae43f68660a40c12670376278ed05c85

  • SHA256

    028a100c10821dd5a822609fc56c313c6e741551aebe60239ae0b12970acbd9b

  • SHA512

    457665367bcbdfaaff600d8349a6a71131d38728f34722ab85b247e421a5c0a2cdb7ef024439a19119e4fae2afe07b62105ff242c82e7fa0430f71163c5fe3a3

  • SSDEEP

    393216:ZqPnLFXlrNQ+DOETgs77fGUggIHvE7EzqOU0Zq:QPLFXNNQ/E7hjIs7VOy

Malware Config

Targets

    • Target

      main.exe

    • Size

      18.6MB

    • MD5

      9ba87fa5ed4b8db9d1baf3f041b77106

    • SHA1

      1090cc1aae43f68660a40c12670376278ed05c85

    • SHA256

      028a100c10821dd5a822609fc56c313c6e741551aebe60239ae0b12970acbd9b

    • SHA512

      457665367bcbdfaaff600d8349a6a71131d38728f34722ab85b247e421a5c0a2cdb7ef024439a19119e4fae2afe07b62105ff242c82e7fa0430f71163c5fe3a3

    • SSDEEP

      393216:ZqPnLFXlrNQ+DOETgs77fGUggIHvE7EzqOU0Zq:QPLFXNNQ/E7hjIs7VOy

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks