General

  • Target

    Rat scanner.exe

  • Size

    17.8MB

  • Sample

    241016-2flztawgpf

  • MD5

    411dedf9696e98add975b27d641a6c16

  • SHA1

    791c902f484fb044f7fa356299306e1a1ab42443

  • SHA256

    2499a2c229fd1fe83284b38d050afb8940a10c68cec322370f22f68d60a39928

  • SHA512

    ffaab6d8dd58086137409b99e2aaefed123da06b4a707c444792863ff9bf110ff07925ef04685fe2417ab3d793d24221aa1edba50cc1ccc6de2fe83418ad0857

  • SSDEEP

    393216:nqPnLFXlreQ8DOETgsvfGjgXlqvE1hqp2sXAQq:qPLFXNeQhEQ8502V

Malware Config

Targets

    • Target

      Rat scanner.exe

    • Size

      17.8MB

    • MD5

      411dedf9696e98add975b27d641a6c16

    • SHA1

      791c902f484fb044f7fa356299306e1a1ab42443

    • SHA256

      2499a2c229fd1fe83284b38d050afb8940a10c68cec322370f22f68d60a39928

    • SHA512

      ffaab6d8dd58086137409b99e2aaefed123da06b4a707c444792863ff9bf110ff07925ef04685fe2417ab3d793d24221aa1edba50cc1ccc6de2fe83418ad0857

    • SSDEEP

      393216:nqPnLFXlreQ8DOETgsvfGjgXlqvE1hqp2sXAQq:qPLFXNeQhEQ8502V

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks