General

  • Target

    source_prepared.exe

  • Size

    107.2MB

  • Sample

    241023-mtcwqsxeqp

  • MD5

    627e8bc0dd7a740b066980758dbcf2ad

  • SHA1

    3593e152b08af0cc607e77eb627f73b3bd28f0a3

  • SHA256

    6ba79505401e365e61b605e44264864d804592495f169d43ad062ed140d4ebba

  • SHA512

    dd6b195353d821146acd049d5d119a10cdb5a5984020807ce09064289e0f73dfafcf604aca6810c9b516d4a0fcb892dc760a48a3f654ed5fa6d4b0c0278388e5

  • SSDEEP

    3145728:eUer7RS6xjKcBa6/2qHO5iFpBnG0iWMstB2OxQtyX7:9YFSWNa6NHCibhieB

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      107.2MB

    • MD5

      627e8bc0dd7a740b066980758dbcf2ad

    • SHA1

      3593e152b08af0cc607e77eb627f73b3bd28f0a3

    • SHA256

      6ba79505401e365e61b605e44264864d804592495f169d43ad062ed140d4ebba

    • SHA512

      dd6b195353d821146acd049d5d119a10cdb5a5984020807ce09064289e0f73dfafcf604aca6810c9b516d4a0fcb892dc760a48a3f654ed5fa6d4b0c0278388e5

    • SSDEEP

      3145728:eUer7RS6xjKcBa6/2qHO5iFpBnG0iWMstB2OxQtyX7:9YFSWNa6NHCibhieB

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks