General

  • Target

    build.exe

  • Size

    20.7MB

  • Sample

    241019-b33b7syhng

  • MD5

    92b08e455cd066328e3b7b6cf36204cd

  • SHA1

    871da677654e98f81dd047b5db01cde540838bdd

  • SHA256

    9eb4576524cb313ed7ac3f3483f1ab3ed9b47feec59024da1c9b6962940324e6

  • SHA512

    d4870a4017eecc2d3e47e7586b5236d292791eb46267fe01ca47625eec2efcd10937c4c0b0055b7dd290d6bdaf39ecf492b6d29da976bd556e7aae9acb333f38

  • SSDEEP

    393216:MqPnLFXlrfh2Jp5qC3njkVQ8DOETgsvfGiKgcVWoWvE4GfL0Rm:9PLFXNfh50sQhE0Lsovt

Malware Config

Targets

    • Target

      build.exe

    • Size

      20.7MB

    • MD5

      92b08e455cd066328e3b7b6cf36204cd

    • SHA1

      871da677654e98f81dd047b5db01cde540838bdd

    • SHA256

      9eb4576524cb313ed7ac3f3483f1ab3ed9b47feec59024da1c9b6962940324e6

    • SHA512

      d4870a4017eecc2d3e47e7586b5236d292791eb46267fe01ca47625eec2efcd10937c4c0b0055b7dd290d6bdaf39ecf492b6d29da976bd556e7aae9acb333f38

    • SSDEEP

      393216:MqPnLFXlrfh2Jp5qC3njkVQ8DOETgsvfGiKgcVWoWvE4GfL0Rm:9PLFXNfh50sQhE0Lsovt

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks