General

  • Target

    Startup.exe

  • Size

    18.6MB

  • Sample

    240928-vz4weaxdrj

  • MD5

    5570a34572f239e646cba209b4311b70

  • SHA1

    e6bd86a956c2a52c753b9e1a6d791ea6942a722a

  • SHA256

    2c3741d24ff901a2372119749abe022d2f1b2b5cfcc497f3c75716faa000c396

  • SHA512

    343f1f5731a7214b6aa95c7067a46e5c005455cecb554562713932cb3c03cb7d421c044e2db07b920d10b65397bbfea9e20e5478997040b0ce4afc9d61c184a3

  • SSDEEP

    393216:gqPnLFXlrG+Q+DOETgs77fGqg+tXvEZLF0rsYj6q:hPLFXNG+Q/E79/t8H8J

Malware Config

Targets

    • Target

      Startup.exe

    • Size

      18.6MB

    • MD5

      5570a34572f239e646cba209b4311b70

    • SHA1

      e6bd86a956c2a52c753b9e1a6d791ea6942a722a

    • SHA256

      2c3741d24ff901a2372119749abe022d2f1b2b5cfcc497f3c75716faa000c396

    • SHA512

      343f1f5731a7214b6aa95c7067a46e5c005455cecb554562713932cb3c03cb7d421c044e2db07b920d10b65397bbfea9e20e5478997040b0ce4afc9d61c184a3

    • SSDEEP

      393216:gqPnLFXlrG+Q+DOETgs77fGqg+tXvEZLF0rsYj6q:hPLFXNG+Q/E79/t8H8J

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks