General

  • Target

    relent.exe

  • Size

    17.9MB

  • Sample

    241124-yzes3atkdp

  • MD5

    da7540ba48528414074f30729a7a6025

  • SHA1

    f54c2220a77b39d48be469210ac3dfc17cbed201

  • SHA256

    8af961f8d2e03f3ca5bcb5a9e051efd96a19a2902590decfd33e3fd7666eadc8

  • SHA512

    502a11a5c5fef6a6722d9e4b0f3ae819aeb87713b564fc1d2ede14e1026dde620fd64aa571888b69d29333d245a85d1df4801c31d0b4a549a86da634c33412d8

  • SSDEEP

    393216:LqPnLFXlrZZQMDOETgsvfGfgbHPvEo1qm/PFuWcJqo:ePLFXNnQREAUHUoA2Nu0o

Malware Config

Targets

    • Target

      relent.exe

    • Size

      17.9MB

    • MD5

      da7540ba48528414074f30729a7a6025

    • SHA1

      f54c2220a77b39d48be469210ac3dfc17cbed201

    • SHA256

      8af961f8d2e03f3ca5bcb5a9e051efd96a19a2902590decfd33e3fd7666eadc8

    • SHA512

      502a11a5c5fef6a6722d9e4b0f3ae819aeb87713b564fc1d2ede14e1026dde620fd64aa571888b69d29333d245a85d1df4801c31d0b4a549a86da634c33412d8

    • SSDEEP

      393216:LqPnLFXlrZZQMDOETgsvfGfgbHPvEo1qm/PFuWcJqo:ePLFXNnQREAUHUoA2Nu0o

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks