General

  • Target

    ip logger05 (2).exe

  • Size

    23.1MB

  • Sample

    241019-2yq2gsthnh

  • MD5

    73dab1ddaa151543b1c6c24117c314ec

  • SHA1

    c49f40c75b13e78991cff06542339ec28a7daffa

  • SHA256

    b5843d3fc248b933ed1fbad848ad5de6c25b8d2663b758f40409da51dab9ce86

  • SHA512

    2d0a35de30eba9e3cfc2f0bcee80888eaa9656f3bde830b13dbd3639ced8cfd51e31864ddf465bbc0a51f26a0465790abaf9413f5e161f6357b0fd720aff9a02

  • SSDEEP

    393216:7u7L/1a/vUI2t2DfDg8QGDOoKktc60FM7gS5bzq5HsZjTkBJOqSDNeoKqB:7CLdaE2b08QwOo+tM7Tb26NwBJOpNZ

Malware Config

Targets

    • Target

      ip logger05 (2).exe

    • Size

      23.1MB

    • MD5

      73dab1ddaa151543b1c6c24117c314ec

    • SHA1

      c49f40c75b13e78991cff06542339ec28a7daffa

    • SHA256

      b5843d3fc248b933ed1fbad848ad5de6c25b8d2663b758f40409da51dab9ce86

    • SHA512

      2d0a35de30eba9e3cfc2f0bcee80888eaa9656f3bde830b13dbd3639ced8cfd51e31864ddf465bbc0a51f26a0465790abaf9413f5e161f6357b0fd720aff9a02

    • SSDEEP

      393216:7u7L/1a/vUI2t2DfDg8QGDOoKktc60FM7gS5bzq5HsZjTkBJOqSDNeoKqB:7CLdaE2b08QwOo+tM7Tb26NwBJOpNZ

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks