General

  • Target

    Bloxstrap-v2.7.05.exe

  • Size

    18.6MB

  • Sample

    241122-vqvw5szrbp

  • MD5

    ee7a292a65ca2a55bdc86f2c6c8d8646

  • SHA1

    8ad1af9570440001667cc265c2cbffb849f6a89e

  • SHA256

    dfaa0dd4361c812eb9a8ea49b6d20d9e9d5288b8b2bc7baeaf893f1e969a0c93

  • SHA512

    5fa5d45288b9c55de5a87eff536b53147a20ce9b7d90ae19354eb541c0eca7fefb303766bbd855f8428bb81e9a99713219a839939a5c5923d3e5eafc5d250c7f

  • SSDEEP

    393216:yqPnLFXlrzQ+DOETgs77fGUgl85riqzvEkkRNGTGNkq:3PLFXNzQ/E7tu85riqYkEGO

Malware Config

Targets

    • Target

      Bloxstrap-v2.7.05.exe

    • Size

      18.6MB

    • MD5

      ee7a292a65ca2a55bdc86f2c6c8d8646

    • SHA1

      8ad1af9570440001667cc265c2cbffb849f6a89e

    • SHA256

      dfaa0dd4361c812eb9a8ea49b6d20d9e9d5288b8b2bc7baeaf893f1e969a0c93

    • SHA512

      5fa5d45288b9c55de5a87eff536b53147a20ce9b7d90ae19354eb541c0eca7fefb303766bbd855f8428bb81e9a99713219a839939a5c5923d3e5eafc5d250c7f

    • SSDEEP

      393216:yqPnLFXlrzQ+DOETgs77fGUgl85riqzvEkkRNGTGNkq:3PLFXNzQ/E7tu85riqYkEGO

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks