Resubmissions

28-09-2024 20:14

240928-yzyaeavanp 10

28-09-2024 20:09

240928-yw49jsthnl 10

28-09-2024 19:46

240928-yg6h3awdrg 10

General

  • Target

    Spoofer-free.exe

  • Size

    18.6MB

  • Sample

    240928-yw49jsthnl

  • MD5

    479d5df3622c32c9c4f70f39051686f1

  • SHA1

    3148ece25b8d47daebac1c56cf85130e5fdab875

  • SHA256

    ed8c6c8b540cfbe6d09258f9fb75f841c174ed299af4829ac909e267a1cdad6d

  • SHA512

    2f35c700a9351d0884bb97ca1f81d30269c7e36d2c532b6efa6599dbc3caee2d998c7fab63cb645e8e9b982a9bacf22cf6937327880976685b5053a92e5c7745

  • SSDEEP

    393216:PqPnLFXlrNQ+DOETgs77fGfgg/AvEj204QaKq:iPLFXNNQ/E7spBj4h

Malware Config

Targets

    • Target

      Spoofer-free.exe

    • Size

      18.6MB

    • MD5

      479d5df3622c32c9c4f70f39051686f1

    • SHA1

      3148ece25b8d47daebac1c56cf85130e5fdab875

    • SHA256

      ed8c6c8b540cfbe6d09258f9fb75f841c174ed299af4829ac909e267a1cdad6d

    • SHA512

      2f35c700a9351d0884bb97ca1f81d30269c7e36d2c532b6efa6599dbc3caee2d998c7fab63cb645e8e9b982a9bacf22cf6937327880976685b5053a92e5c7745

    • SSDEEP

      393216:PqPnLFXlrNQ+DOETgs77fGfgg/AvEj204QaKq:iPLFXNNQ/E7spBj4h

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks