General

  • Target

    dpYZvD

  • Size

    496B

  • Sample

    241017-t75x1avdqc

  • MD5

    15ad4035e30bdeb0f5eb426c542e8058

  • SHA1

    4a87e3e681dc71252e621281d8152e8776ce8241

  • SHA256

    1141d5cd4398321071d654de1b46a10b772ab722791461026872539eedfb09be

  • SHA512

    cb06177f64e8f168af75cd9db9fe172d7638d64a44fd24022d16f8e70f27e7827fd0ab4569af5b42fb66b6cfd269d2c9379811a24cdaaaebb94d278d4251f799

Malware Config

Targets

    • Target

      dpYZvD

    • Size

      496B

    • MD5

      15ad4035e30bdeb0f5eb426c542e8058

    • SHA1

      4a87e3e681dc71252e621281d8152e8776ce8241

    • SHA256

      1141d5cd4398321071d654de1b46a10b772ab722791461026872539eedfb09be

    • SHA512

      cb06177f64e8f168af75cd9db9fe172d7638d64a44fd24022d16f8e70f27e7827fd0ab4569af5b42fb66b6cfd269d2c9379811a24cdaaaebb94d278d4251f799

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks