General

  • Target

    dropbeast.exe

  • Size

    41.1MB

  • Sample

    241106-t6qfxswmcm

  • MD5

    ca14a33325087ad3b97d9c76d628d1e1

  • SHA1

    83e5ca030b062f9a1faf07cf8b5b2b2f7c7edc14

  • SHA256

    1693df9d970e011cf1c827fceaf49a3724f4478bc0ed7dc50f2d90ea417b6d38

  • SHA512

    83a72f992dc257b16b8680a7c51b65ad5485cb8fe30c2024de2050cd8836260c81facf950a494c15ed4735dbf4dbcbfa3b57b0fedd746927284dc62cf4a5200e

  • SSDEEP

    393216:WEr+7CAtJyEsYLrH95y/1uzVyQcNnxu+ds+o0ECKHOQKtuK+Vf6qrdWY6wdla9FE:Wdv86wQ0xYKX8HFrsPFlX/QF

Malware Config

Targets

    • Target

      dropbeast.exe

    • Size

      41.1MB

    • MD5

      ca14a33325087ad3b97d9c76d628d1e1

    • SHA1

      83e5ca030b062f9a1faf07cf8b5b2b2f7c7edc14

    • SHA256

      1693df9d970e011cf1c827fceaf49a3724f4478bc0ed7dc50f2d90ea417b6d38

    • SHA512

      83a72f992dc257b16b8680a7c51b65ad5485cb8fe30c2024de2050cd8836260c81facf950a494c15ed4735dbf4dbcbfa3b57b0fedd746927284dc62cf4a5200e

    • SSDEEP

      393216:WEr+7CAtJyEsYLrH95y/1uzVyQcNnxu+ds+o0ECKHOQKtuK+Vf6qrdWY6wdla9FE:Wdv86wQ0xYKX8HFrsPFlX/QF

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks