General

  • Target

    J30dogx.exe

  • Size

    25.2MB

  • Sample

    241015-w5564azdrg

  • MD5

    fc4efef8dd056626597fe832c571b4f9

  • SHA1

    cde3b6953f0819a26cf52a92afd9ec172ae3e800

  • SHA256

    b9c4d38be6f2ec424111524ae6d34f0e3e70e41127acb7e84b81877cd6126b21

  • SHA512

    8e48077abc72149fe68a40d2695646bbd2bc669acc732a039a783919d2c09fd4d37229338581f35afdc62a2bd44b165034d78ca74b68f0313b19e730a9d91864

  • SSDEEP

    393216:VqPnLFXlrSde9TQ9U06hsDOETgs77cGIZMNVgLjGISpMpDspotkPpL89/9sM:MPLFXNhQ9+hxE7z3uNGaaL8U

Malware Config

Targets

    • Target

      J30dogx.exe

    • Size

      25.2MB

    • MD5

      fc4efef8dd056626597fe832c571b4f9

    • SHA1

      cde3b6953f0819a26cf52a92afd9ec172ae3e800

    • SHA256

      b9c4d38be6f2ec424111524ae6d34f0e3e70e41127acb7e84b81877cd6126b21

    • SHA512

      8e48077abc72149fe68a40d2695646bbd2bc669acc732a039a783919d2c09fd4d37229338581f35afdc62a2bd44b165034d78ca74b68f0313b19e730a9d91864

    • SSDEEP

      393216:VqPnLFXlrSde9TQ9U06hsDOETgs77cGIZMNVgLjGISpMpDspotkPpL89/9sM:MPLFXNhQ9+hxE7z3uNGaaL8U

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks