General

  • Target

    vex5.6.exe

  • Size

    18.7MB

  • Sample

    241126-dqsy4s1nfs

  • MD5

    c8539f9f96843182db746487a9e72d8b

  • SHA1

    9cc42701b69a7baa5a24f5efbe1224d9daacd0ba

  • SHA256

    0e425ee0cab9a6aa0d1519a0eaf451e945453bf5686cd96cbb316bee3e438c3d

  • SHA512

    1ad8da1f13317b76e578d007b59d5be38a1ebbb782678cca3c7bfba0c1289fb13b383f089702952565df749599a55cd18eebd5c243102e2ec8d75f5a903c572d

  • SSDEEP

    393216:fqPnLFXlrQgQpDOETgsvfGMwcg1jBvE4vVY9rQm:yPLFXN5QoEvIi7R

Malware Config

Targets

    • Target

      vex5.6.exe

    • Size

      18.7MB

    • MD5

      c8539f9f96843182db746487a9e72d8b

    • SHA1

      9cc42701b69a7baa5a24f5efbe1224d9daacd0ba

    • SHA256

      0e425ee0cab9a6aa0d1519a0eaf451e945453bf5686cd96cbb316bee3e438c3d

    • SHA512

      1ad8da1f13317b76e578d007b59d5be38a1ebbb782678cca3c7bfba0c1289fb13b383f089702952565df749599a55cd18eebd5c243102e2ec8d75f5a903c572d

    • SSDEEP

      393216:fqPnLFXlrQgQpDOETgsvfGMwcg1jBvE4vVY9rQm:yPLFXN5QoEvIi7R

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks