General

  • Target

    Installer.exe

  • Size

    17.9MB

  • Sample

    241023-q83bqatcpa

  • MD5

    3bc73bbd654b556ba0f7fdf9759a2414

  • SHA1

    e504c3028e84ac73abff5fda5fd4e56974b26f49

  • SHA256

    1cdcefc94d887efecea97c24c434bc0e5c64c2d4cf21ccebbee1efadd5efc3cb

  • SHA512

    6f649cf185b5017f47e2c8d41430f21e3f6d0d06de7cd34b1fb33f372510474a2a54a1b240f5ab76128f137f84b65568139ad0d206d7e0d4481f57179fe76366

  • SSDEEP

    393216:UqPnLFXlrQQ+DOETgsvfGMFgeLpvE66mJkQ7Cq:1PLFXNQQ/EFJLeP+kq

Malware Config

Targets

    • Target

      Installer.exe

    • Size

      17.9MB

    • MD5

      3bc73bbd654b556ba0f7fdf9759a2414

    • SHA1

      e504c3028e84ac73abff5fda5fd4e56974b26f49

    • SHA256

      1cdcefc94d887efecea97c24c434bc0e5c64c2d4cf21ccebbee1efadd5efc3cb

    • SHA512

      6f649cf185b5017f47e2c8d41430f21e3f6d0d06de7cd34b1fb33f372510474a2a54a1b240f5ab76128f137f84b65568139ad0d206d7e0d4481f57179fe76366

    • SSDEEP

      393216:UqPnLFXlrQQ+DOETgsvfGMFgeLpvE66mJkQ7Cq:1PLFXNQQ/EFJLeP+kq

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks