General

  • Target

    main.exe

  • Size

    18.6MB

  • Sample

    241019-lr665azbnb

  • MD5

    98beecf4b800ef75e67462e7f3ee9a56

  • SHA1

    b78e1d3cb63afdbc62a8d13376ad2be396f8e79f

  • SHA256

    f2540f6b574ae2829487b540f080e8084d2deb2364df5efa9dbe51a9f0632ee9

  • SHA512

    ca7da3d15ae463a0ce42767fde0768c840692bd59a1d48f0b42a1aeba901c8962950891ebcd55f53d083c9c87422a9cd0c46144f23ca6769d32100a0ed5d54bd

  • SSDEEP

    393216:bqPnLFXlrmQMDOETgs77fGXgl4iHvEgrpdlT2WOq:uPLFXNmQRE7ke6IvlT1

Malware Config

Targets

    • Target

      main.exe

    • Size

      18.6MB

    • MD5

      98beecf4b800ef75e67462e7f3ee9a56

    • SHA1

      b78e1d3cb63afdbc62a8d13376ad2be396f8e79f

    • SHA256

      f2540f6b574ae2829487b540f080e8084d2deb2364df5efa9dbe51a9f0632ee9

    • SHA512

      ca7da3d15ae463a0ce42767fde0768c840692bd59a1d48f0b42a1aeba901c8962950891ebcd55f53d083c9c87422a9cd0c46144f23ca6769d32100a0ed5d54bd

    • SSDEEP

      393216:bqPnLFXlrmQMDOETgs77fGXgl4iHvEgrpdlT2WOq:uPLFXNmQRE7ke6IvlT1

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks