General

  • Target

    main.exe

  • Size

    17.9MB

  • Sample

    241111-td4sva1fkc

  • MD5

    e1de4e938353b091aac0b8b490a21f79

  • SHA1

    befca71309030a60646000710b6f519a85c6f58b

  • SHA256

    4f387e732a79995a4bfb8e9a564df01301c0342a25fd8f6ecdf4070908c57b27

  • SHA512

    e910274387c48cb18c795eb5f2657ce174787c76db4bce586e3a29a9f88593976dd84ec8a943ef3a2526573fd71881ae837401b585c5e8fee633a936f1befc07

  • SSDEEP

    393216:aqPnLFXlrzQMDOETgsvfGog7MwpvEcNd6IXPTnmo:vPLFXNzQRElCse0IXSo

Malware Config

Targets

    • Target

      main.exe

    • Size

      17.9MB

    • MD5

      e1de4e938353b091aac0b8b490a21f79

    • SHA1

      befca71309030a60646000710b6f519a85c6f58b

    • SHA256

      4f387e732a79995a4bfb8e9a564df01301c0342a25fd8f6ecdf4070908c57b27

    • SHA512

      e910274387c48cb18c795eb5f2657ce174787c76db4bce586e3a29a9f88593976dd84ec8a943ef3a2526573fd71881ae837401b585c5e8fee633a936f1befc07

    • SSDEEP

      393216:aqPnLFXlrzQMDOETgsvfGog7MwpvEcNd6IXPTnmo:vPLFXNzQRElCse0IXSo

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks