General

  • Target

    nig.exe

  • Size

    17.9MB

  • Sample

    241008-s7h8kaxcng

  • MD5

    d996e1f209faa379f4954d6080deb703

  • SHA1

    4b581fd1c67d48afd5801c73cef8c6a3cbe55839

  • SHA256

    421bb5520a2de6417c681aa736ba77067055dd7459531db92815dc5b3435c893

  • SHA512

    5aaa528c823d83b0ea83932e970ae8340ed1cc8101870fc222bc559377ffc14858b94cdaedeb674957aae78e0f27c5ac6683b91fccc74a10ba2573a797876d33

  • SSDEEP

    393216:dqPnLFXlrQQ+DOETgsvfGM6gGkAAvEAinz1iPmq:kPLFXNQQ/E6lkQNz14

Malware Config

Targets

    • Target

      nig.exe

    • Size

      17.9MB

    • MD5

      d996e1f209faa379f4954d6080deb703

    • SHA1

      4b581fd1c67d48afd5801c73cef8c6a3cbe55839

    • SHA256

      421bb5520a2de6417c681aa736ba77067055dd7459531db92815dc5b3435c893

    • SHA512

      5aaa528c823d83b0ea83932e970ae8340ed1cc8101870fc222bc559377ffc14858b94cdaedeb674957aae78e0f27c5ac6683b91fccc74a10ba2573a797876d33

    • SSDEEP

      393216:dqPnLFXlrQQ+DOETgsvfGM6gGkAAvEAinz1iPmq:kPLFXNQQ/E6lkQNz14

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks