General

  • Target

    hoodz beamer.rar

  • Size

    18.8MB

  • Sample

    241019-25stnavcpc

  • MD5

    f1b46ec7d9a41dd7a44c4fd40d493958

  • SHA1

    54a0c54777204abacad609ae8ea97c7d34337901

  • SHA256

    b4ce474d5ae3ccb827e983931b14e72ac83e97bb5b542c5b99a325d4ce8b63ed

  • SHA512

    6985ea966286d7389ff6789d17beb224f97f7073c1fa4ac1df5d022eb35ccbe1bab32563835512b9ab4cb282df7940db2c7aa496a67190f4bffcf5de066c3ac7

  • SSDEEP

    393216:qB54zIsJnibGkJTnDtd+OARF9XC6YrsTtjNNW4N:qOziNBdYvXC5aRXN

Malware Config

Targets

    • Target

      main.exe

    • Size

      19.0MB

    • MD5

      36ec10e3787e38644a2f0bd1886e9772

    • SHA1

      eb4d6130a9a736b1689909bb08ac66010f27b66d

    • SHA256

      6e8e38d1de830032303ce9f1256e184f4f817925a1ecf3ce5d73b04c1e99ead1

    • SHA512

      51e669dceaa4c83be209e6593fef2c2acfa0d9e4dc080494d694819baf8db1662f1a9b81626598810580cd562736b4676ab640ae4670880cb67cad60593e96a6

    • SSDEEP

      393216:9qPnLFXlrmQMDOETgs77fGGZMPRgA6hvE0nXcsfIUq:EPLFXNmQRE7aJRj63u

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks