General

  • Target

    main.exe

  • Size

    20.5MB

  • Sample

    241023-yb3vzsydmm

  • MD5

    31b53c6c5f319b3ffe71251978497f00

  • SHA1

    16e1d68ac5d06343ad845d736561faea2a750e46

  • SHA256

    16525f6618f4be8467765b8f77452519f26b672f36ecae26b1ee1ef580698a46

  • SHA512

    ddd4401502303c35597520e8a8cdcf840867bc3e96df1ff63acddc67e8189beb9f0a945e7728d5a840f1068f3e4b0fdd6b6387050204eebc8ffbc6299fbb472e

  • SSDEEP

    393216:YqPnLFXlrxIxBZgQpDOETgsvfGdKgtJgF7PvE49KpkP1G:JPLFXNSyQoEzSWFQZk

Malware Config

Targets

    • Target

      main.exe

    • Size

      20.5MB

    • MD5

      31b53c6c5f319b3ffe71251978497f00

    • SHA1

      16e1d68ac5d06343ad845d736561faea2a750e46

    • SHA256

      16525f6618f4be8467765b8f77452519f26b672f36ecae26b1ee1ef580698a46

    • SHA512

      ddd4401502303c35597520e8a8cdcf840867bc3e96df1ff63acddc67e8189beb9f0a945e7728d5a840f1068f3e4b0fdd6b6387050204eebc8ffbc6299fbb472e

    • SSDEEP

      393216:YqPnLFXlrxIxBZgQpDOETgsvfGdKgtJgF7PvE49KpkP1G:JPLFXNSyQoEzSWFQZk

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks