General

  • Target

    main.exe

  • Size

    18.7MB

  • Sample

    241025-ylaxysvfrk

  • MD5

    ed67b1509189fc5cab187ab0f9b178f7

  • SHA1

    79ddc6965c88d1b17453c768b9fae2f98543333e

  • SHA256

    91936c9fdcfc2f8885c42559e973353866f331b73c5c1e0f6a8bcc6a448d9237

  • SHA512

    17e63b7430ca3201a674a1ea04c6f944df3c7aabfd3b23e13fa159604b864597920381c8805a9203e2e5e2daf99e871f3abdc5c121744c3bf93fcdc014f5d75f

  • SSDEEP

    393216:0qPnLFXlrLBQ+DOETgsvfGfg7206vE45gA4EN+m:VPLFXNLBQ/EgI/nAr

Malware Config

Targets

    • Target

      main.exe

    • Size

      18.7MB

    • MD5

      ed67b1509189fc5cab187ab0f9b178f7

    • SHA1

      79ddc6965c88d1b17453c768b9fae2f98543333e

    • SHA256

      91936c9fdcfc2f8885c42559e973353866f331b73c5c1e0f6a8bcc6a448d9237

    • SHA512

      17e63b7430ca3201a674a1ea04c6f944df3c7aabfd3b23e13fa159604b864597920381c8805a9203e2e5e2daf99e871f3abdc5c121744c3bf93fcdc014f5d75f

    • SSDEEP

      393216:0qPnLFXlrLBQ+DOETgsvfGfg7206vE45gA4EN+m:VPLFXNLBQ/EgI/nAr

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks