General

  • Target

    ippuller.exe

  • Size

    6.7MB

  • Sample

    241019-akq1saxfpn

  • MD5

    21dcd8761055c91c1db2ca4b18588d34

  • SHA1

    71362a7af55355701bf417a7761dd362d60536fe

  • SHA256

    37fb572d67193c1bc1ea5484d60239b6201e9397ccebf0d2dba18d847f2cb15e

  • SHA512

    5cb092c7991e7bde94d3d66f6a1c71a4332b729c7a44c772128c4f3bf4f80238946b6004ee96e0cde0823a825a6c39104e0d317584ad58a977dc0d4748958fdf

  • SSDEEP

    98304:tDEtdFBblpGSamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK5SpXqQRoBMCs3E:taFdmeN/FJMIDJf0gsAGK5SEQRouCvTl

Malware Config

Targets

    • Target

      ippuller.exe

    • Size

      6.7MB

    • MD5

      21dcd8761055c91c1db2ca4b18588d34

    • SHA1

      71362a7af55355701bf417a7761dd362d60536fe

    • SHA256

      37fb572d67193c1bc1ea5484d60239b6201e9397ccebf0d2dba18d847f2cb15e

    • SHA512

      5cb092c7991e7bde94d3d66f6a1c71a4332b729c7a44c772128c4f3bf4f80238946b6004ee96e0cde0823a825a6c39104e0d317584ad58a977dc0d4748958fdf

    • SSDEEP

      98304:tDEtdFBblpGSamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK5SpXqQRoBMCs3E:taFdmeN/FJMIDJf0gsAGK5SEQRouCvTl

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks