General

  • Target

    chrome.exe

  • Size

    17.7MB

  • Sample

    241003-ya8d3swfmb

  • MD5

    2620c6da4ae0252b84ac079cfe267bc1

  • SHA1

    e87aa5dad66574831addf8e394e1dc32ef0cc82f

  • SHA256

    f9b4cfe2561b041342ad23745d93aab76e5541a5af9dd1a54808557a5453df40

  • SHA512

    9d8120f6ec70c2bf4c36549205fce52d41c91c23acb018ad29bc58587d404ae4f0f371917d6147f97077281e54b33aae805abb35d77c95ee00aa3d63cf87ff8a

  • SSDEEP

    393216:KqPnLFXlrPmQ8DOETgsvfGFtgUnLvEDpH84q:fPLFXNOQhEyXwtQ

Malware Config

Targets

    • Target

      chrome.exe

    • Size

      17.7MB

    • MD5

      2620c6da4ae0252b84ac079cfe267bc1

    • SHA1

      e87aa5dad66574831addf8e394e1dc32ef0cc82f

    • SHA256

      f9b4cfe2561b041342ad23745d93aab76e5541a5af9dd1a54808557a5453df40

    • SHA512

      9d8120f6ec70c2bf4c36549205fce52d41c91c23acb018ad29bc58587d404ae4f0f371917d6147f97077281e54b33aae805abb35d77c95ee00aa3d63cf87ff8a

    • SSDEEP

      393216:KqPnLFXlrPmQ8DOETgsvfGFtgUnLvEDpH84q:fPLFXNOQhEyXwtQ

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks