General

  • Target

    rizzing.exe

  • Size

    23.3MB

  • Sample

    241006-qx7gas1dlb

  • MD5

    0ed897cda8574680b0db7749d9927869

  • SHA1

    2bf486edc0f49d7397d81071b08f3d07db72d319

  • SHA256

    540abf386f1bd706e442b7cd602c00621615c43650fdc3688c087d246e6f91ad

  • SHA512

    e073531b640586d70a3432011784cd497ff39d46b00450b1d94d747120dae9add4c90f973ccbaff89c9312d827d31ae4214895470aff6dd71eb671063dc1e83c

  • SSDEEP

    393216:C82LCOkVzSFurEUWj3EXpJbTic75cfSybp4UggpcG3Z4dDZeQyOpXmXXHN+s1+kk:hOkgFdbIJbTiumfSybpuG3Z6teQyO6Hp

Malware Config

Targets

    • Target

      rizzing.exe

    • Size

      23.3MB

    • MD5

      0ed897cda8574680b0db7749d9927869

    • SHA1

      2bf486edc0f49d7397d81071b08f3d07db72d319

    • SHA256

      540abf386f1bd706e442b7cd602c00621615c43650fdc3688c087d246e6f91ad

    • SHA512

      e073531b640586d70a3432011784cd497ff39d46b00450b1d94d747120dae9add4c90f973ccbaff89c9312d827d31ae4214895470aff6dd71eb671063dc1e83c

    • SSDEEP

      393216:C82LCOkVzSFurEUWj3EXpJbTic75cfSybp4UggpcG3Z4dDZeQyOpXmXXHN+s1+kk:hOkgFdbIJbTiumfSybpuG3Z6teQyO6Hp

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks