General

  • Target

    JaySpoof.exe

  • Size

    17.9MB

  • Sample

    241006-th6g8sxamh

  • MD5

    188245ca05af0d3c7a53c7454eb314d6

  • SHA1

    ae8a243154f60da435012be1bbdbb209513b25d6

  • SHA256

    0e1adb806520aa1472d27b9593e7129fc759eb715f826ddf1d3e2b378cb5b9d3

  • SHA512

    0942b2045d210460c092c39d1169dd6c8a28d13082e15d01d6ff72649cc1899c6dca3a1f6688b5eac1e5e7ee63728343b06486d9899983aa546fd67dbdbf85d0

  • SSDEEP

    393216:NqPnLFXlrQQ+DOETgsvfGMXgiFVaO2vEHoXM/HudCq:UPLFXNQQ/EX9COPIc/m

Malware Config

Targets

    • Target

      JaySpoof.exe

    • Size

      17.9MB

    • MD5

      188245ca05af0d3c7a53c7454eb314d6

    • SHA1

      ae8a243154f60da435012be1bbdbb209513b25d6

    • SHA256

      0e1adb806520aa1472d27b9593e7129fc759eb715f826ddf1d3e2b378cb5b9d3

    • SHA512

      0942b2045d210460c092c39d1169dd6c8a28d13082e15d01d6ff72649cc1899c6dca3a1f6688b5eac1e5e7ee63728343b06486d9899983aa546fd67dbdbf85d0

    • SSDEEP

      393216:NqPnLFXlrQQ+DOETgsvfGMXgiFVaO2vEHoXM/HudCq:UPLFXNQQ/EX9COPIc/m

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks