General

  • Target

    dc88cca0c72a2d4c7f1bc6dcbea6e36825270ed11e34c08f80ee22fb146ca31f.exe

  • Size

    13.3MB

  • Sample

    241123-dk6ysasqek

  • MD5

    2dbf5e00223bd7d14ca7ed7be362866f

  • SHA1

    034858ad907ea7bc24a77e51140d3b97efd7ab21

  • SHA256

    dc88cca0c72a2d4c7f1bc6dcbea6e36825270ed11e34c08f80ee22fb146ca31f

  • SHA512

    e400087661f32adf1626c166c178638b3eb1d9d064f1d1e7547d802bc8c718d555e11fafb226b6e3ba9d4801ee3040054164680813f75c243bec18c2a3a18789

  • SSDEEP

    393216:V9YiZ+XMCHWUjccuICvR/P0vKfXmsg8YiZdo:V9YiZ+XMb8JE/svKOudo

Malware Config

Targets

    • Target

      dc88cca0c72a2d4c7f1bc6dcbea6e36825270ed11e34c08f80ee22fb146ca31f.exe

    • Size

      13.3MB

    • MD5

      2dbf5e00223bd7d14ca7ed7be362866f

    • SHA1

      034858ad907ea7bc24a77e51140d3b97efd7ab21

    • SHA256

      dc88cca0c72a2d4c7f1bc6dcbea6e36825270ed11e34c08f80ee22fb146ca31f

    • SHA512

      e400087661f32adf1626c166c178638b3eb1d9d064f1d1e7547d802bc8c718d555e11fafb226b6e3ba9d4801ee3040054164680813f75c243bec18c2a3a18789

    • SSDEEP

      393216:V9YiZ+XMCHWUjccuICvR/P0vKfXmsg8YiZdo:V9YiZ+XMb8JE/svKOudo

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks