General

  • Target

    Email Account Generator Checker.exe

  • Size

    18.5MB

  • Sample

    241123-j12lws1pet

  • MD5

    dff9f39043444ab1a536baf40e378826

  • SHA1

    117a174b82e1199f3291007c88e35c36046dc51c

  • SHA256

    65e009d8920b5a5986b27ac647c1df0473564d39be7a3aeff7355f62a0f0c900

  • SHA512

    9dda045c9dad009808f0f411a50a2d8b2cf9ae947992775434a0f11a91184c09e9808eb15b27ba3ba102b6c6fc013e49857f7ef864139f0d63ce302cfe296ada

  • SSDEEP

    393216:O9YiwQNPxl63hucb9c5hlERSAdZYyc40ZHrG5Nif8sUy:O9YiwQL43hrREhkSAdZPWHarjly

Malware Config

Targets

    • Target

      Email Account Generator Checker.exe

    • Size

      18.5MB

    • MD5

      dff9f39043444ab1a536baf40e378826

    • SHA1

      117a174b82e1199f3291007c88e35c36046dc51c

    • SHA256

      65e009d8920b5a5986b27ac647c1df0473564d39be7a3aeff7355f62a0f0c900

    • SHA512

      9dda045c9dad009808f0f411a50a2d8b2cf9ae947992775434a0f11a91184c09e9808eb15b27ba3ba102b6c6fc013e49857f7ef864139f0d63ce302cfe296ada

    • SSDEEP

      393216:O9YiwQNPxl63hucb9c5hlERSAdZYyc40ZHrG5Nif8sUy:O9YiwQL43hrREhkSAdZPWHarjly

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks