General

  • Target

    KametaGame.rar

  • Size

    73.8MB

  • Sample

    241112-jb8znsxgqp

  • MD5

    33ba76588509e5781f6956aafe7599c6

  • SHA1

    a06e53afc79cc79a2e45c3964286ffea83628403

  • SHA256

    7410df3bf88e63503d20b65415fcbca83893ab9d320e33abde333ae0ae6accd3

  • SHA512

    920261b97bd4aeab225817ddd2b147b0b1a44885602f1ce4510098ed2d0a888553fd76637743ef1ce279ee85d9971a98c0d0e01862db9d996a5613b9cd96772f

  • SSDEEP

    1572864:ejawPf5MWjCLmhYT+H0pw0CDQWvoR7tQiYNaXqsOG8jLmn:eNqBmNUCaNtPYUX7X8jLa

Malware Config

Targets

    • Target

      KametaGame.rar

    • Size

      73.8MB

    • MD5

      33ba76588509e5781f6956aafe7599c6

    • SHA1

      a06e53afc79cc79a2e45c3964286ffea83628403

    • SHA256

      7410df3bf88e63503d20b65415fcbca83893ab9d320e33abde333ae0ae6accd3

    • SHA512

      920261b97bd4aeab225817ddd2b147b0b1a44885602f1ce4510098ed2d0a888553fd76637743ef1ce279ee85d9971a98c0d0e01862db9d996a5613b9cd96772f

    • SSDEEP

      1572864:ejawPf5MWjCLmhYT+H0pw0CDQWvoR7tQiYNaXqsOG8jLmn:eNqBmNUCaNtPYUX7X8jLa

    • Hexon family

    • Hexon stealer

      Hexon is a stealer written in Electron NodeJS.

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks