General

  • Target

    Verse.exe

  • Size

    17.9MB

  • Sample

    241113-t5j8hsyndn

  • MD5

    71958aa4f304c2eb0426c016dd047961

  • SHA1

    799215882ef02215eea2561d5bb9063edd264bad

  • SHA256

    edf4ad3746b4a697bc89ff04cd7beab927f9de446804b887a962b8eb148cc4e6

  • SHA512

    ee5b5f97a8b1bc0dab833c3429ed9121f943f48f37043eb2383ae1c08869d32c23a19afde75e1a46fa6404b50c58a83bad9503296cd33fe9ffd7ea022a1e2650

  • SSDEEP

    393216:jqPnLFXlr/QMDOETgsvfG2xgF5iAvEeqrJZiAKq:mPLFXN/QREnUA5JJZ

Malware Config

Targets

    • Target

      Verse.exe

    • Size

      17.9MB

    • MD5

      71958aa4f304c2eb0426c016dd047961

    • SHA1

      799215882ef02215eea2561d5bb9063edd264bad

    • SHA256

      edf4ad3746b4a697bc89ff04cd7beab927f9de446804b887a962b8eb148cc4e6

    • SHA512

      ee5b5f97a8b1bc0dab833c3429ed9121f943f48f37043eb2383ae1c08869d32c23a19afde75e1a46fa6404b50c58a83bad9503296cd33fe9ffd7ea022a1e2650

    • SSDEEP

      393216:jqPnLFXlr/QMDOETgsvfG2xgF5iAvEeqrJZiAKq:mPLFXN/QREnUA5JJZ

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks