General

  • Target

    loader x3 dll.exe

  • Size

    17.8MB

  • Sample

    241027-x45plsyngv

  • MD5

    c0f5b898fdf8bb7bfe146e9b4641b915

  • SHA1

    270b7e4faffc226534d9b5e659ce7c53b6b6da55

  • SHA256

    09665c212f89bc4cf3a356ca28bdc35c272e17633bcb04e340eb37c6365f6495

  • SHA512

    1c084398d2884a18149c508a8a4bf130710a36e14013372cd005e0bce48721406fd5a791104ac1a860df197294e8b012e70f61e57becc601b91fb6aee6b48144

  • SSDEEP

    393216:NqPnLFXlreQ8DOETgsvfGVMgVGvEUeJB2OvMooq:UPLFXNeQhEjmfvT2OvD

Malware Config

Targets

    • Target

      loader x3 dll.exe

    • Size

      17.8MB

    • MD5

      c0f5b898fdf8bb7bfe146e9b4641b915

    • SHA1

      270b7e4faffc226534d9b5e659ce7c53b6b6da55

    • SHA256

      09665c212f89bc4cf3a356ca28bdc35c272e17633bcb04e340eb37c6365f6495

    • SHA512

      1c084398d2884a18149c508a8a4bf130710a36e14013372cd005e0bce48721406fd5a791104ac1a860df197294e8b012e70f61e57becc601b91fb6aee6b48144

    • SSDEEP

      393216:NqPnLFXlreQ8DOETgsvfGVMgVGvEUeJB2OvMooq:UPLFXNeQhEjmfvT2OvD

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks