General

  • Target

    emg.exe

  • Size

    17.8MB

  • Sample

    241002-sbsgcswcng

  • MD5

    ebaeb31d05df7d82b560e9c1544c5360

  • SHA1

    b95067422193e0ee4ac6bba2e4bf7d046edc0342

  • SHA256

    d802376cc14091a5a973ff119d2749dac7c9fec6583f400b3eaf57dcea76dc66

  • SHA512

    1a5ee6f85f3197b2f1832aaa8601465574b1f886ca1a4cafbc1cd384566aba87a9ff5ca8632d9e6531d569da2bfbb6f8abe780609aac06895969bb3a80b333b9

  • SSDEEP

    393216:7qPnLFXlrPmQ8DOETgsvfGF8gSSvvEMwZlXnOq:OPLFXNOQhENR1jln

Malware Config

Targets

    • Target

      emg.exe

    • Size

      17.8MB

    • MD5

      ebaeb31d05df7d82b560e9c1544c5360

    • SHA1

      b95067422193e0ee4ac6bba2e4bf7d046edc0342

    • SHA256

      d802376cc14091a5a973ff119d2749dac7c9fec6583f400b3eaf57dcea76dc66

    • SHA512

      1a5ee6f85f3197b2f1832aaa8601465574b1f886ca1a4cafbc1cd384566aba87a9ff5ca8632d9e6531d569da2bfbb6f8abe780609aac06895969bb3a80b333b9

    • SSDEEP

      393216:7qPnLFXlrPmQ8DOETgsvfGF8gSSvvEMwZlXnOq:OPLFXNOQhENR1jln

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks