General

  • Target

    pixe 2.exe

  • Size

    18.6MB

  • Sample

    240928-vmfcaazaja

  • MD5

    16227009d9bb67d3b664679c62532fbe

  • SHA1

    4e8977008e26d767d1aae902e9a2ad693b7ff8a5

  • SHA256

    95c32b86030a40a2495400d4a17c78d6619e3cd3d4a56bdb05b3dfc74d9f7d8e

  • SHA512

    945f0f268edf101624375a9e886663130db0c55db12ded5d981a5be3e5cd97817c8632d4fdfc2cb01f1407cf1fcf5d48b26cf5980737ba9ec51c96e93fed543b

  • SSDEEP

    393216:KqPnLFXlrNQ+DOETgs77fGMrgPZYkKvErb8Offjuq:fPLFXNNQ/E7vyNjkOfr

Malware Config

Targets

    • Target

      pixe 2.exe

    • Size

      18.6MB

    • MD5

      16227009d9bb67d3b664679c62532fbe

    • SHA1

      4e8977008e26d767d1aae902e9a2ad693b7ff8a5

    • SHA256

      95c32b86030a40a2495400d4a17c78d6619e3cd3d4a56bdb05b3dfc74d9f7d8e

    • SHA512

      945f0f268edf101624375a9e886663130db0c55db12ded5d981a5be3e5cd97817c8632d4fdfc2cb01f1407cf1fcf5d48b26cf5980737ba9ec51c96e93fed543b

    • SSDEEP

      393216:KqPnLFXlrNQ+DOETgs77fGMrgPZYkKvErb8Offjuq:fPLFXNNQ/E7vyNjkOfr

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks