General

  • Target

    Antydot V2.zip

  • Size

    17.7MB

  • Sample

    241021-e5k3gszgmm

  • MD5

    93c822762dad1329ac4278a88e28b256

  • SHA1

    ff6644b3437199727b8972e420190b648ca52a42

  • SHA256

    42fc5f34f923ea7c98ce1dc5e2973201fe1208d541fc15089095767388589d7d

  • SHA512

    84c27538450ead0ddcbe004fef06a549d4f76c0ac2eaee1730bd00cf64a00d7ecc4cbc67296af6062c3896589bf2c3b2f4ea3afd039c0b5e65e1e57ff278e613

  • SSDEEP

    393216:yklV1BBzb3UK5oYBAurNkVlrid5S1wG76DD2ee0P:vl/BBP3UnkE/1p6DhP

Malware Config

Targets

    • Target

      Antydote V2.exe

    • Size

      17.9MB

    • MD5

      f1327e0a27b493fb21f8ae8af15322e6

    • SHA1

      9cd8d849c2f25edacf3b48fab6c7c8fbc328cae2

    • SHA256

      bd7cb389c957cc7385950b15a67c43a6d336ac4c35826b7bc31ab08966449758

    • SHA512

      eb2202f801c82d1e65134fdae8c3d7f798fc63b30a48fa7ea0705232fe289972368363c8e01b17ecec6c391d3208dfc1aaf2c07a63f766b8284dad1ce128ca2f

    • SSDEEP

      393216:zqPnLFXlr/QMDOETgsvfGqLegeyx4vE18rzgET/nq:2PLFXN/QREujgx1ggE2

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks