General

  • Target

    AYZEN_Spoofer.exe

  • Size

    17.9MB

  • Sample

    241110-vq1sdszrfz

  • MD5

    c085c4fdb2b6db3561affe6e2ba75e8e

  • SHA1

    8b991a06e6c7dc7221db9ac6f0c45c8492ee282c

  • SHA256

    468ecba7d45361f976db40b21f4f7ded668d75771d30663f3a5010e3b9049e65

  • SHA512

    ee7dd719ea82fa15a5a8e2d45ac7f9732a67d905c6abc345167d94aa6b99fa12009f85dce00fc0d87904e6657918a972c62e864ef0bb96a3fb465e6e96f74c6b

  • SSDEEP

    393216:HqPnLFXlrzQMDOETgsvfGfgDAi6vEVgO46zYqo:KPLFXNzQREksrT54Oo

Malware Config

Targets

    • Target

      AYZEN_Spoofer.exe

    • Size

      17.9MB

    • MD5

      c085c4fdb2b6db3561affe6e2ba75e8e

    • SHA1

      8b991a06e6c7dc7221db9ac6f0c45c8492ee282c

    • SHA256

      468ecba7d45361f976db40b21f4f7ded668d75771d30663f3a5010e3b9049e65

    • SHA512

      ee7dd719ea82fa15a5a8e2d45ac7f9732a67d905c6abc345167d94aa6b99fa12009f85dce00fc0d87904e6657918a972c62e864ef0bb96a3fb465e6e96f74c6b

    • SSDEEP

      393216:HqPnLFXlrzQMDOETgsvfGfgDAi6vEVgO46zYqo:KPLFXNzQREksrT54Oo

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks