General

  • Target

    MidnightLauncher.exe

  • Size

    18.9MB

  • Sample

    241128-t92y5aypak

  • MD5

    72ae959467441cdcaf804f6a632945a5

  • SHA1

    904da07402eaf4168043119f38249ddeb310ce7e

  • SHA256

    074bc2771b74de5382df0387e954e3c8d01cf89110af6e4938b3aa3b7882ea5e

  • SHA512

    cafc2a98fa2fa5f01db6f9a7dac241704fadf5773c40dad73518ae9e529ce93ff0ba9c6ebaf1a825c6437356e56494455dd135e96f6a30b8c302538f98f38385

  • SSDEEP

    393216:RqPnLFXlrJQMDOETgsvfGzgzhwxJ6Zji6E2oBln1b:4PLFXNJQREymhfNHE2oPl

Malware Config

Targets

    • Target

      MidnightLauncher.exe

    • Size

      18.9MB

    • MD5

      72ae959467441cdcaf804f6a632945a5

    • SHA1

      904da07402eaf4168043119f38249ddeb310ce7e

    • SHA256

      074bc2771b74de5382df0387e954e3c8d01cf89110af6e4938b3aa3b7882ea5e

    • SHA512

      cafc2a98fa2fa5f01db6f9a7dac241704fadf5773c40dad73518ae9e529ce93ff0ba9c6ebaf1a825c6437356e56494455dd135e96f6a30b8c302538f98f38385

    • SSDEEP

      393216:RqPnLFXlrJQMDOETgsvfGzgzhwxJ6Zji6E2oBln1b:4PLFXNJQREymhfNHE2oPl

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks