General

  • Target

    PaidFn.exe

  • Size

    18.6MB

  • Sample

    240930-nml2haxcmb

  • MD5

    444259113515d0ee43a88785c4125d36

  • SHA1

    b7f29d3e900cd32c07fe83e97435ce7d04d29440

  • SHA256

    3a53ae3e69ebe97893558d34d4ad45354ce7352caf57976b13694e6076d4993a

  • SHA512

    be867930cfca2fedb06e7b0644d69ef3199991f64e5479de679f95e9b4b7577913249f50f7cd6166f0c8ca54786e874cc8f758fee110f39d6021cce2aa491d6e

  • SSDEEP

    393216:QqPnLFXlrNQ+DOETgs77fGMIgLnh4hW7hvE76aiAxkweHq:RPLFXNNQ/E7konOW72B/x6K

Malware Config

Targets

    • Target

      PaidFn.exe

    • Size

      18.6MB

    • MD5

      444259113515d0ee43a88785c4125d36

    • SHA1

      b7f29d3e900cd32c07fe83e97435ce7d04d29440

    • SHA256

      3a53ae3e69ebe97893558d34d4ad45354ce7352caf57976b13694e6076d4993a

    • SHA512

      be867930cfca2fedb06e7b0644d69ef3199991f64e5479de679f95e9b4b7577913249f50f7cd6166f0c8ca54786e874cc8f758fee110f39d6021cce2aa491d6e

    • SSDEEP

      393216:QqPnLFXlrNQ+DOETgs77fGMIgLnh4hW7hvE76aiAxkweHq:RPLFXNNQ/E7konOW72B/x6K

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks