General

  • Target

    Loader.exe

  • Size

    18.8MB

  • Sample

    241027-x17d2asbkq

  • MD5

    46418e5b2cc3e2ebace59357d6725a7f

  • SHA1

    eb7bbedaee97b14b1c681b7b1350f85286e52e1f

  • SHA256

    faad3e4633b1ca87594253933ddac5b668ae81c8267172a3627779206286bc89

  • SHA512

    031c04165bb8233bf1e61858299b2935bfe9a0b4864f023dd7f3749637a23e1b13e347bf5c2b81c59d4c7781ec6bd00688989d4b8d191b06bd55800e4071d074

  • SSDEEP

    393216:HeqPnLFXlryQMDOETgs77fGjgntADkZhvEJCNiLEdOq:HTPLFXNyQRE7wctADksMiG

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      18.8MB

    • MD5

      46418e5b2cc3e2ebace59357d6725a7f

    • SHA1

      eb7bbedaee97b14b1c681b7b1350f85286e52e1f

    • SHA256

      faad3e4633b1ca87594253933ddac5b668ae81c8267172a3627779206286bc89

    • SHA512

      031c04165bb8233bf1e61858299b2935bfe9a0b4864f023dd7f3749637a23e1b13e347bf5c2b81c59d4c7781ec6bd00688989d4b8d191b06bd55800e4071d074

    • SSDEEP

      393216:HeqPnLFXlryQMDOETgs77fGjgntADkZhvEJCNiLEdOq:HTPLFXNyQRE7wctADksMiG

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks