General

  • Target

    main.bat

  • Size

    17.9MB

  • Sample

    241004-yav4rawhre

  • MD5

    28c78a747598c5540c656454e48312ae

  • SHA1

    82f3c24e15a453d98a4870c1aed0239bdf5ebd69

  • SHA256

    186197fe395c3ebb3056d0cffe7e329531e5b21eac81402d9ca4a5df830b1660

  • SHA512

    e0ab1df72f1d8a464c9fb69bc34bccfb5deaedc0c100dcbc43e888feb3366629d2c3c59ce692f46389b9b12996610d6361ac35f23fff2c437aa643592641caa5

  • SSDEEP

    393216:PqPnLFXlrZQ+DOETgsvfGEg2HLvEl1uDZ+krddq:iPLFXNZQ/EdpQl4t+kK

Malware Config

Targets

    • Target

      main.bat

    • Size

      17.9MB

    • MD5

      28c78a747598c5540c656454e48312ae

    • SHA1

      82f3c24e15a453d98a4870c1aed0239bdf5ebd69

    • SHA256

      186197fe395c3ebb3056d0cffe7e329531e5b21eac81402d9ca4a5df830b1660

    • SHA512

      e0ab1df72f1d8a464c9fb69bc34bccfb5deaedc0c100dcbc43e888feb3366629d2c3c59ce692f46389b9b12996610d6361ac35f23fff2c437aa643592641caa5

    • SSDEEP

      393216:PqPnLFXlrZQ+DOETgsvfGEg2HLvEl1uDZ+krddq:iPLFXNZQ/EdpQl4t+kK

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks