General

  • Target

    main.exe

  • Size

    23.8MB

  • Sample

    241008-n5nm2s1gng

  • MD5

    3c21e21091d121631f1233d46791446d

  • SHA1

    3d9c840ad0812d9058abbb53eb825b9aa0e2b491

  • SHA256

    eb1e8880a041300a68790cc7c21ad86a60f7884c3325d4a51ddfbfa5acdd3cc8

  • SHA512

    029079c44db97c5e6e7a135f3899764267df36c90dd05b9f8f9e4923e1637bb276f45ed293ab956bbde1d71a103d96a361444bd97815ac7f645803c51a9b88c9

  • SSDEEP

    393216:qqPnLFXlrxde9TQDyRTDOETgsvcGMmVgCupWpXpW/cc3I+M4rs:/PLFXNOQDyAE/rlDKdI+w

Malware Config

Targets

    • Target

      main.exe

    • Size

      23.8MB

    • MD5

      3c21e21091d121631f1233d46791446d

    • SHA1

      3d9c840ad0812d9058abbb53eb825b9aa0e2b491

    • SHA256

      eb1e8880a041300a68790cc7c21ad86a60f7884c3325d4a51ddfbfa5acdd3cc8

    • SHA512

      029079c44db97c5e6e7a135f3899764267df36c90dd05b9f8f9e4923e1637bb276f45ed293ab956bbde1d71a103d96a361444bd97815ac7f645803c51a9b88c9

    • SSDEEP

      393216:qqPnLFXlrxde9TQDyRTDOETgsvcGMmVgCupWpXpW/cc3I+M4rs:/PLFXNOQDyAE/rlDKdI+w

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks