General

  • Target

    ZaiPrivateRUNASADMIN.exe

  • Size

    17.9MB

  • Sample

    240929-v4wqlaxbje

  • MD5

    09fa5a70bedf0d34780c924a3bd49c1f

  • SHA1

    ad8440457662d1ea99b89ab46c41ad01f9b13943

  • SHA256

    87a3dd83d974ac74a1583ee3031f951c1366790086c8cd06cf8f286338751cf9

  • SHA512

    0257dd13d9b944b1c740f52e6773b0b45078b861e69e2711b6173c75bb09fa4f5b82f51fc5efc619da453d58b059ea19829ecae8a29b3907fa5db83811e54b3b

  • SSDEEP

    393216:POqPnLFXlrQQ+DOETgsvfGxgfyvEhABdKZW0q:bPLFXNQQ/Eq+L2/K0

Malware Config

Targets

    • Target

      ZaiPrivateRUNASADMIN.exe

    • Size

      17.9MB

    • MD5

      09fa5a70bedf0d34780c924a3bd49c1f

    • SHA1

      ad8440457662d1ea99b89ab46c41ad01f9b13943

    • SHA256

      87a3dd83d974ac74a1583ee3031f951c1366790086c8cd06cf8f286338751cf9

    • SHA512

      0257dd13d9b944b1c740f52e6773b0b45078b861e69e2711b6173c75bb09fa4f5b82f51fc5efc619da453d58b059ea19829ecae8a29b3907fa5db83811e54b3b

    • SSDEEP

      393216:POqPnLFXlrQQ+DOETgsvfGxgfyvEhABdKZW0q:bPLFXNQQ/Eq+L2/K0

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks