General

  • Target

    main.exe

  • Size

    17.9MB

  • Sample

    241121-j3w47aznhz

  • MD5

    c5f4d4b49b9d7302ae742d441675162d

  • SHA1

    f054dc6950bc0979c2b8871ff666082b91d1f23e

  • SHA256

    386cb7bf4bb16a313d0090c8a638fdaea2a206ab781c8f0bf3587f6c5bb7a407

  • SHA512

    f4a328bd4a1487585c52e98607e42c6a899e93478ab18ac0e2ec81e7316341c592ce3daaf18e4e9f4ad2428e4bce1734432c66ab31d76030d363e13b755d0a64

  • SSDEEP

    393216:KqPnLFXlrp5QMDOETgsvfGVugI0KvED3LwPi0Rq:fPLFXNp5QREpMjnwPM

Malware Config

Targets

    • Target

      main.exe

    • Size

      17.9MB

    • MD5

      c5f4d4b49b9d7302ae742d441675162d

    • SHA1

      f054dc6950bc0979c2b8871ff666082b91d1f23e

    • SHA256

      386cb7bf4bb16a313d0090c8a638fdaea2a206ab781c8f0bf3587f6c5bb7a407

    • SHA512

      f4a328bd4a1487585c52e98607e42c6a899e93478ab18ac0e2ec81e7316341c592ce3daaf18e4e9f4ad2428e4bce1734432c66ab31d76030d363e13b755d0a64

    • SSDEEP

      393216:KqPnLFXlrp5QMDOETgsvfGVugI0KvED3LwPi0Rq:fPLFXNp5QREpMjnwPM

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks