Resubmissions

30/09/2024, 13:48

240930-q4f8paydjp 7

16/04/2024, 13:27

240416-qp4enscg5y 7

General

  • Target

    SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe

  • Size

    16.8MB

  • Sample

    240930-q4f8paydjp

  • MD5

    8970451141430c26562d36432eaa8d75

  • SHA1

    9a8a345b036b2b3a78bb811d2cd4b21d72afde0e

  • SHA256

    21a9b4859121afcf6690c2c15b795094986c0a20c36a356c3915f107ec41f67a

  • SHA512

    dd80172f86f7e2136637858b688dbacefc5e7e5fe9aab065a949788a11bc7ed1efdf6d7346c7409186ae37e5b8d7a0c97b3e1f4cf1400affd35200536e289143

  • SSDEEP

    393216:GEkZgf8FgP8AxYDX1+TtIiFGuvB5IjWqn6eclz1PyxXUS+da:GRbFbX71QtIZS3ILn6ecHyV+da

Malware Config

Targets

    • Target

      SecuriteInfo.com.Python.Stealer.1447.10844.3562.exe

    • Size

      16.8MB

    • MD5

      8970451141430c26562d36432eaa8d75

    • SHA1

      9a8a345b036b2b3a78bb811d2cd4b21d72afde0e

    • SHA256

      21a9b4859121afcf6690c2c15b795094986c0a20c36a356c3915f107ec41f67a

    • SHA512

      dd80172f86f7e2136637858b688dbacefc5e7e5fe9aab065a949788a11bc7ed1efdf6d7346c7409186ae37e5b8d7a0c97b3e1f4cf1400affd35200536e289143

    • SSDEEP

      393216:GEkZgf8FgP8AxYDX1+TtIiFGuvB5IjWqn6eclz1PyxXUS+da:GRbFbX71QtIZS3ILn6ecHyV+da

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks