General

  • Target

    windowsupdater.exe

  • Size

    24.1MB

  • Sample

    240928-wvxf7ssbpf

  • MD5

    e6d9db70b8deabc5e94ce398b8ffda62

  • SHA1

    ac863a303b49bd56487a0fecbd853909ea723515

  • SHA256

    dc2fa69b3b0133b2f4244c1adbdc618e626e676656d1899670cf9a7a4f19fe53

  • SHA512

    297dd84d87f521e441c47c20b5cfb02ac60785549cee7fd0aa9d4118727344e37111203260d3d0e7963d6e40f22137a09f816ca90f97fbba44b4ec75beee7773

  • SSDEEP

    393216:wqPnLFXlrG3c1kQSWsgIDOETgsvcGFwVg9T2C4lpMpBKIycUXZnFSs:xPLFXNG3GkQS3gNEOET7GdXx

Malware Config

Targets

    • Target

      windowsupdater.exe

    • Size

      24.1MB

    • MD5

      e6d9db70b8deabc5e94ce398b8ffda62

    • SHA1

      ac863a303b49bd56487a0fecbd853909ea723515

    • SHA256

      dc2fa69b3b0133b2f4244c1adbdc618e626e676656d1899670cf9a7a4f19fe53

    • SHA512

      297dd84d87f521e441c47c20b5cfb02ac60785549cee7fd0aa9d4118727344e37111203260d3d0e7963d6e40f22137a09f816ca90f97fbba44b4ec75beee7773

    • SSDEEP

      393216:wqPnLFXlrG3c1kQSWsgIDOETgsvcGFwVg9T2C4lpMpBKIycUXZnFSs:xPLFXNG3GkQS3gNEOET7GdXx

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks