Resubmissions

09-11-2024 16:52

241109-vdwb5sxlft 10

09-11-2024 16:52

241109-vdf78ayblg 10

General

  • Target

    main.exe

  • Size

    17.9MB

  • Sample

    241109-vdf78ayblg

  • MD5

    5d946f2799896858663f4c846d6049c8

  • SHA1

    995c45f635cc16985c51b463a38658b2cfcc0d30

  • SHA256

    fddd05ac4f54a75f145e8bef8e0379df4954aa3d2808e7a41bca01c20854047b

  • SHA512

    dcd411bfcc15c183141d6d3b281282b7633ee1dbc254d0187a7d127c432053dcbd79f4b9cc937b7cba736c115a91c17ed82d16f3269ec33eaef371147be40fc7

  • SSDEEP

    393216:hqPnLFXlrzQMDOETgsvfGKQgeoavEOp1rzEu2uqo:IPLFXNzQREAfozQ9EHo

Malware Config

Targets

    • Target

      main.exe

    • Size

      17.9MB

    • MD5

      5d946f2799896858663f4c846d6049c8

    • SHA1

      995c45f635cc16985c51b463a38658b2cfcc0d30

    • SHA256

      fddd05ac4f54a75f145e8bef8e0379df4954aa3d2808e7a41bca01c20854047b

    • SHA512

      dcd411bfcc15c183141d6d3b281282b7633ee1dbc254d0187a7d127c432053dcbd79f4b9cc937b7cba736c115a91c17ed82d16f3269ec33eaef371147be40fc7

    • SSDEEP

      393216:hqPnLFXlrzQMDOETgsvfGKQgeoavEOp1rzEu2uqo:IPLFXNzQREAfozQ9EHo

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks