General

  • Target

    TokenGen.exe

  • Size

    17.7MB

  • Sample

    241109-p4habavdlh

  • MD5

    07aedf7930906cdcadde1e5c7b1e22fa

  • SHA1

    4224cdb22baf8c3d49eb9d66da97ea63de0acc45

  • SHA256

    b56ac555080fda9f494617edd75cba91cb95efd116cfa20c596f33b88455373a

  • SHA512

    cdb2eeed99420cb0395ec29933b87e72fd9d7aa2987f05a7e6d26af35df0a16f156ee860f85939e6610dd09d2c41cd943f74511c19a57123fa36176b23f50099

  • SSDEEP

    393216:1qPnLFXlrjQpDOETgsvfGYgjepcvEGKNpWLh:sPLFXNjQoERmi1V6

Malware Config

Targets

    • Target

      TokenGen.exe

    • Size

      17.7MB

    • MD5

      07aedf7930906cdcadde1e5c7b1e22fa

    • SHA1

      4224cdb22baf8c3d49eb9d66da97ea63de0acc45

    • SHA256

      b56ac555080fda9f494617edd75cba91cb95efd116cfa20c596f33b88455373a

    • SHA512

      cdb2eeed99420cb0395ec29933b87e72fd9d7aa2987f05a7e6d26af35df0a16f156ee860f85939e6610dd09d2c41cd943f74511c19a57123fa36176b23f50099

    • SSDEEP

      393216:1qPnLFXlrjQpDOETgsvfGYgjepcvEGKNpWLh:sPLFXNjQoERmi1V6

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks