Resubmissions

29-10-2024 19:42

241029-yetfqaydqe 10

29-10-2024 19:38

241029-ycceesxmgv 10

General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241029-yetfqaydqe

  • MD5

    ec797de1749a825c2337828a5286a1db

  • SHA1

    2aaa26027d6443ff52be2faecf8ffdf255b89b33

  • SHA256

    17949c84ef78cbb5335cc642f1f7e66532d5689ec37b864e08fa431699ff1142

  • SHA512

    6358ac811209537b1848628b2469f496b57e49e2ce404ba7070e76f795cdca264f5d83ce35c83e3844bc843ff63bbb323d5de4d25714dad6582e7e497ddee6dd

  • SSDEEP

    98304:M5DjWM8JEE1F6mamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFh:M50kPeNTfm/pf+xk4dWRpmrbW3jmrp

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      ec797de1749a825c2337828a5286a1db

    • SHA1

      2aaa26027d6443ff52be2faecf8ffdf255b89b33

    • SHA256

      17949c84ef78cbb5335cc642f1f7e66532d5689ec37b864e08fa431699ff1142

    • SHA512

      6358ac811209537b1848628b2469f496b57e49e2ce404ba7070e76f795cdca264f5d83ce35c83e3844bc843ff63bbb323d5de4d25714dad6582e7e497ddee6dd

    • SSDEEP

      98304:M5DjWM8JEE1F6mamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFh:M50kPeNTfm/pf+xk4dWRpmrbW3jmrp

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks