General

  • Target

    MidnightLauncher.exe

  • Size

    17.9MB

  • Sample

    241127-v8e9eazkep

  • MD5

    99e7fb22d61afd0d3eae3fd0de136a19

  • SHA1

    a613a69be5eb2444838aee2affbca5c3dc378a4d

  • SHA256

    7d212f9db88825f5c5adebafe15eb8b4c10332dba4739e352dd4bea31eb1774b

  • SHA512

    12cd68fff8c8040ae3d8e165d0b686d8f46861dbd1274471dd93421ccd6404acfb730b4542e02dc2c4d4360c8f06b99341c84995ca6e68504cc7edf87ed4d904

  • SSDEEP

    393216:BqPnLFXlrRQMDOETgsvfGyg1wJ6ZjYUGppL++Lle:oPLFXNRQRENkNNYbpLJe

Malware Config

Targets

    • Target

      MidnightLauncher.exe

    • Size

      17.9MB

    • MD5

      99e7fb22d61afd0d3eae3fd0de136a19

    • SHA1

      a613a69be5eb2444838aee2affbca5c3dc378a4d

    • SHA256

      7d212f9db88825f5c5adebafe15eb8b4c10332dba4739e352dd4bea31eb1774b

    • SHA512

      12cd68fff8c8040ae3d8e165d0b686d8f46861dbd1274471dd93421ccd6404acfb730b4542e02dc2c4d4360c8f06b99341c84995ca6e68504cc7edf87ed4d904

    • SSDEEP

      393216:BqPnLFXlrRQMDOETgsvfGyg1wJ6ZjYUGppL++Lle:oPLFXNRQRENkNNYbpLJe

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks