General

  • Target

    Thriller.exe

  • Size

    6.9MB

  • Sample

    241030-qxclxssrgw

  • MD5

    2c6ba9686b74756a407fb32843c11335

  • SHA1

    7699af131889314e2786cab5718c1fade1d2be67

  • SHA256

    92c60517d714cb839bc6bb3167ff89ae56d638f0d43da2c38dc48e35efabad50

  • SHA512

    635debf3d756d2720fcd2c374f32650b0620558fa67de4a2f929151b801f524feae1f139efe9655137969b026f6af74fe80d5b5e6efa54f3849f5f0a643886c6

  • SSDEEP

    98304:KYDjWM8JEE1FVHamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIF9:KY0bqeNTfm/pf+xk4dWRpmrbW3jmrV

Malware Config

Targets

    • Target

      Thriller.exe

    • Size

      6.9MB

    • MD5

      2c6ba9686b74756a407fb32843c11335

    • SHA1

      7699af131889314e2786cab5718c1fade1d2be67

    • SHA256

      92c60517d714cb839bc6bb3167ff89ae56d638f0d43da2c38dc48e35efabad50

    • SHA512

      635debf3d756d2720fcd2c374f32650b0620558fa67de4a2f929151b801f524feae1f139efe9655137969b026f6af74fe80d5b5e6efa54f3849f5f0a643886c6

    • SSDEEP

      98304:KYDjWM8JEE1FVHamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIF9:KY0bqeNTfm/pf+xk4dWRpmrbW3jmrV

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks