General

  • Target

    Stando-uni-fix.exe

  • Size

    18.7MB

  • Sample

    241020-avds7szgkr

  • MD5

    92aa0abba620ef636eed703cea4faf4e

  • SHA1

    48ffa4c98f7722afcbdc55485e3f2a8b629dcefe

  • SHA256

    76c893aa38fc5e3bffb2e3e250faf285b2d6c91e1359d51d22b668733c6f9cb9

  • SHA512

    2bd9a65735ca77fe280672bfc6dbf7bf19e95989814563be2eaaa56dbe331ee9940faad3d4e23725a9fcc31bce9a1ca234b4c931229397c9ff6f73bafa7d10b4

  • SSDEEP

    393216:uqPnLFXlrp93PQMDOETgs77fG1g0E/vEoZ3LpI6lq:jPLFXNp93PQRE76VtkLp4

Malware Config

Targets

    • Target

      Stando-uni-fix.exe

    • Size

      18.7MB

    • MD5

      92aa0abba620ef636eed703cea4faf4e

    • SHA1

      48ffa4c98f7722afcbdc55485e3f2a8b629dcefe

    • SHA256

      76c893aa38fc5e3bffb2e3e250faf285b2d6c91e1359d51d22b668733c6f9cb9

    • SHA512

      2bd9a65735ca77fe280672bfc6dbf7bf19e95989814563be2eaaa56dbe331ee9940faad3d4e23725a9fcc31bce9a1ca234b4c931229397c9ff6f73bafa7d10b4

    • SSDEEP

      393216:uqPnLFXlrp93PQMDOETgs77fG1g0E/vEoZ3LpI6lq:jPLFXNp93PQRE76VtkLp4

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks