General

  • Target

    Hell.gen.rar

  • Size

    17.6MB

  • Sample

    241017-ygeekssfqd

  • MD5

    fc645e1ebfae029dd49166e86d7e3a2f

  • SHA1

    220502a84b91c5dedf741dcc79433293ac5e69a1

  • SHA256

    df42a40b912da477588cb2953758d95d741d197015394c4084aa4d4d78b5e345

  • SHA512

    b3432334c289d5fae112cbe3a5c7649292e8607b9e4328fc0d31667dc1bd65e5c395862fee8d389a1fec17b877fc1f14274486a62b1b134f9511a9224aa1e7e9

  • SSDEEP

    393216:HPrVyH/S8vWnVe4H2lXFf20yPDhyS22l78FnmVXT+rdsW3Be65Sw1kbBc1XdnxKH:HPJYS8viVe4H2koS2agnC+xJBf5obBcW

Malware Config

Targets

    • Target

      hell's generator (1).exe

    • Size

      17.8MB

    • MD5

      fd6b2eb34707a78c796fe7077b6940db

    • SHA1

      a186670a07f032b2c8e8989c7c9cf8f856f27cac

    • SHA256

      560c9fb5d1c9753ec2b52e50e9a9b4fbc468793cfab5e313ba6521af4132c20c

    • SHA512

      452a0394a5f6ecba7ead49994aa93bdb447dc8109600cec455910602f77d0b8f60d8cdd41beb517179b0f88e00c902a999a28760cdb70f3c1ba593fd9317b37e

    • SSDEEP

      393216:4qPnLFCKI8QGQ8DOETgsvfGwxSzB9JFwOYDJ:pPLFCKI+QhEwB

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks