General

  • Target

    main.exe

  • Size

    18.6MB

  • Sample

    241019-lt7wfazcne

  • MD5

    a9dad2529ad41ea7729d9c5336fc968d

  • SHA1

    45d37150e9374c1aab144a399cac11836c4c2255

  • SHA256

    2888f7df7eecd477fb4a6f383fb7f7800cb106dd8e551d02c8a25fa6dafa4d5d

  • SHA512

    8db2e7be935b65d5f7c7d0ca363843fd0d28edc9665ccfb4fe82addc2b79b6e49500cd1c7cdf12dff1361ab136082306d049de1c9c2324cf57bcb1737cdf27de

  • SSDEEP

    393216:OqPnLFXlrmQMDOETgs77fGqEgmUOvEg3KowBDNq:DPLFXNmQRE7URUHonwK

Malware Config

Targets

    • Target

      main.exe

    • Size

      18.6MB

    • MD5

      a9dad2529ad41ea7729d9c5336fc968d

    • SHA1

      45d37150e9374c1aab144a399cac11836c4c2255

    • SHA256

      2888f7df7eecd477fb4a6f383fb7f7800cb106dd8e551d02c8a25fa6dafa4d5d

    • SHA512

      8db2e7be935b65d5f7c7d0ca363843fd0d28edc9665ccfb4fe82addc2b79b6e49500cd1c7cdf12dff1361ab136082306d049de1c9c2324cf57bcb1737cdf27de

    • SSDEEP

      393216:OqPnLFXlrmQMDOETgs77fGqEgmUOvEg3KowBDNq:DPLFXNmQRE7URUHonwK

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks