General

  • Target

    7823726582aa208e637140152b546175ae6d2ca8f51aa8874323e8ce6ac94814N

  • Size

    7.7MB

  • Sample

    241015-qpr2ms1brq

  • MD5

    9079304f271cbc8d810740c1c17683e0

  • SHA1

    1ed415e0f2c35f89477bb646125e6fb9224ba562

  • SHA256

    7823726582aa208e637140152b546175ae6d2ca8f51aa8874323e8ce6ac94814

  • SHA512

    272b6e717fca2d8e57d2f43efa1916b2867e60cbbf89073d1ddaf034696692e8d06b47f511b759c738f6157126674a8388c7e2a88492b631124510ca84a621b8

  • SSDEEP

    196608:BQ0pv0UeNTfm/pf+xk4dNSESRptrbWOjgr:1vcy/pWu4m5RptrbvMr

Malware Config

Targets

    • Target

      7823726582aa208e637140152b546175ae6d2ca8f51aa8874323e8ce6ac94814N

    • Size

      7.7MB

    • MD5

      9079304f271cbc8d810740c1c17683e0

    • SHA1

      1ed415e0f2c35f89477bb646125e6fb9224ba562

    • SHA256

      7823726582aa208e637140152b546175ae6d2ca8f51aa8874323e8ce6ac94814

    • SHA512

      272b6e717fca2d8e57d2f43efa1916b2867e60cbbf89073d1ddaf034696692e8d06b47f511b759c738f6157126674a8388c7e2a88492b631124510ca84a621b8

    • SSDEEP

      196608:BQ0pv0UeNTfm/pf+xk4dNSESRptrbWOjgr:1vcy/pWu4m5RptrbvMr

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks