General

  • Target

    Vape_V4.exe

  • Size

    17.6MB

  • Sample

    241005-ypwc3awbrd

  • MD5

    067d721cbbe02148bc00a6f3510f3f01

  • SHA1

    a7311a4a56a3aa482006a645ae25d6346f70a6a5

  • SHA256

    6ab2ccf4c745a5afc7e265f41eac28519026445a2fe9056ce10b8b86dd6a4015

  • SHA512

    bd0af5cbbe6c67d9f093e9b7512b6579ae92254f78933adcfdabecd442ab5c3ce8edb78f7690d41373837a20652d5d59111854c44d10d47a6def249d21d4f0ec

  • SSDEEP

    393216:FqPnLFXlr8gQpDOETgsvfGFg+7N2uvE17gXL3:8PLFXNlQoE45R2n+7

Malware Config

Targets

    • Target

      Vape_V4.exe

    • Size

      17.6MB

    • MD5

      067d721cbbe02148bc00a6f3510f3f01

    • SHA1

      a7311a4a56a3aa482006a645ae25d6346f70a6a5

    • SHA256

      6ab2ccf4c745a5afc7e265f41eac28519026445a2fe9056ce10b8b86dd6a4015

    • SHA512

      bd0af5cbbe6c67d9f093e9b7512b6579ae92254f78933adcfdabecd442ab5c3ce8edb78f7690d41373837a20652d5d59111854c44d10d47a6def249d21d4f0ec

    • SSDEEP

      393216:FqPnLFXlr8gQpDOETgsvfGFg+7N2uvE17gXL3:8PLFXNlQoE45R2n+7

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks