General

  • Target

    main.exe

  • Size

    17.9MB

  • Sample

    241116-qtgrgaxelg

  • MD5

    18a6abf5391bdb10e065a7046dd5f757

  • SHA1

    e8462dde842b994f3b960a4dcf6b0db95eb33eba

  • SHA256

    b684fe14d2a00cce6acde6a08a0f0cdeb924d6579a67aa2c495eeff346ad0782

  • SHA512

    da01e91f57025dab15e9b04d5e161ea55c918dea391637755e64ebd54d36162be16370ae6947d4317c66c166425ef1350ebe136ec8e87e326ce9d933474665a9

  • SSDEEP

    393216:AqPnLFXlrzQMDOETgsvfGqg4NAHvE5iuXRmtRqo:BPLFXNzQREDjvXXRo

Malware Config

Targets

    • Target

      main.exe

    • Size

      17.9MB

    • MD5

      18a6abf5391bdb10e065a7046dd5f757

    • SHA1

      e8462dde842b994f3b960a4dcf6b0db95eb33eba

    • SHA256

      b684fe14d2a00cce6acde6a08a0f0cdeb924d6579a67aa2c495eeff346ad0782

    • SHA512

      da01e91f57025dab15e9b04d5e161ea55c918dea391637755e64ebd54d36162be16370ae6947d4317c66c166425ef1350ebe136ec8e87e326ce9d933474665a9

    • SSDEEP

      393216:AqPnLFXlrzQMDOETgsvfGqg4NAHvE5iuXRmtRqo:BPLFXNzQREDjvXXRo

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks