General

  • Target

    mlode27gb.mega.rar

  • Size

    17.6MB

  • Sample

    241008-snclnswdmf

  • MD5

    fd9af755a885dc8d3ca202b85ea5de3c

  • SHA1

    3bd012bf915c0d42f14736741295eb2c8f29d4ee

  • SHA256

    36b39ead8c247bad509fdc3a262a500fb2d1c7705d386d767d7a1396bb70738a

  • SHA512

    afc65651c6b26fe931572f39da99b254b40559859f565cd9c14c40427e794ff08e201506cb4f6819b31eb865190e070b9e97d13903caf91a793d1dc1a80299f2

  • SSDEEP

    393216:Ds+QtcKbFQQZrRmTjvndcUtM1FpVfEjtlSo:Ds+OBFQNvdcUtM1F7s

Malware Config

Targets

    • Target

      mlode27gb.mega.rar

    • Size

      17.6MB

    • MD5

      fd9af755a885dc8d3ca202b85ea5de3c

    • SHA1

      3bd012bf915c0d42f14736741295eb2c8f29d4ee

    • SHA256

      36b39ead8c247bad509fdc3a262a500fb2d1c7705d386d767d7a1396bb70738a

    • SHA512

      afc65651c6b26fe931572f39da99b254b40559859f565cd9c14c40427e794ff08e201506cb4f6819b31eb865190e070b9e97d13903caf91a793d1dc1a80299f2

    • SSDEEP

      393216:Ds+QtcKbFQQZrRmTjvndcUtM1FpVfEjtlSo:Ds+OBFQNvdcUtM1F7s

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Target

      mlode27gb.mega.exe

    • Size

      17.8MB

    • MD5

      ac2e992f676cc826485c2c0fd3587285

    • SHA1

      6927974e98fecba41dfe5f98dc67cf958272727e

    • SHA256

      6f87f78f0e85a206c8ac68366cac181613f7f9b1eb73bb274b435fd2188c3e85

    • SHA512

      e8705aa9381eb87bc574a0b1022ff685672901801df92b51b1dd6cba71119613b9937e45d3b5eada02a84c8aa7ee9f6da4915b81ba45672e61d53e10e0eb099f

    • SSDEEP

      393216:8qPnLFXlrPmQ8DOETgsvfGFggv8vEGoCmopCnSq:tPLFXNOQhEpmVlBop6

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      main.pyc

    • Size

      7KB

    • MD5

      54ee26fd0ed29fd3983c04bd4fd35c68

    • SHA1

      ec2d7f38155874df79e8237811007d10dd5340a9

    • SHA256

      45ec6c2c9658adbee09ecc39fe5d1ae1367cb996a7cfa4d1699d8ee8e233005a

    • SHA512

      c3d3755ae57eb36c265a3650fa97d9d0c924414b7a8502c06182d9e07daab801b0aff7d06950f4425f07cbd1155dc0349bc11d7c239254ab0d22e303c9196350

    • SSDEEP

      192:whVA09D8j6/WdXwWSEJKEWQJhwvai9HuMdwbVYPnw:MVAVkWuUhW02vAP5YPw

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks