General

  • Target

    main.exe

  • Size

    18.6MB

  • Sample

    241115-ggbv1szdpg

  • MD5

    0373c71a2e89ba2fee2c79cfb893b43a

  • SHA1

    2149fd3bc6f4a0f26adc8ec247beaf090915d5c1

  • SHA256

    e33d0be241de6d7c2afd405b3fe7073ac1652d49feda2e568f9a1592f0cd4c17

  • SHA512

    ad7c0a2f9cc4e07c2177a6908708c0941e16d9ecbabd7e05d1cdaa2a472d3c107135244b2eed5c19454787edca0e406ea5af76a669ff12e80242e09224127a72

  • SSDEEP

    393216:ZqPnLFXlryQMDOETgs77fGHNgayEwJvEfDCY7oFqo:QPLFXNyQRE74jyEw+WYLo

Malware Config

Targets

    • Target

      main.exe

    • Size

      18.6MB

    • MD5

      0373c71a2e89ba2fee2c79cfb893b43a

    • SHA1

      2149fd3bc6f4a0f26adc8ec247beaf090915d5c1

    • SHA256

      e33d0be241de6d7c2afd405b3fe7073ac1652d49feda2e568f9a1592f0cd4c17

    • SHA512

      ad7c0a2f9cc4e07c2177a6908708c0941e16d9ecbabd7e05d1cdaa2a472d3c107135244b2eed5c19454787edca0e406ea5af76a669ff12e80242e09224127a72

    • SSDEEP

      393216:ZqPnLFXlryQMDOETgs77fGHNgayEwJvEfDCY7oFqo:QPLFXNyQRE74jyEw+WYLo

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks