General

  • Target

    main.exe

  • Size

    17.9MB

  • Sample

    241130-fk3bpstlev

  • MD5

    248c92d0adcc88f04e70e40b903a0d9c

  • SHA1

    186223029f3dc5c2976959fb5496e4b8028d00e0

  • SHA256

    24b6d7c91da49899ba9ef2815636c833c4ad78eb41e2683406a8f6470361abe5

  • SHA512

    8b55868382560d8174edc2f29ba2bb8a07fd71f99c0239c1b2010968a7c8458f60f0a18ce5cbe05cf72ca932fae945d65162be3aaec565b403dd48aef439cb07

  • SSDEEP

    393216:dqPnLFXlrVQMDOETgsvfGkgjTjXVvEK4l6HTzPq:kPLFXNVQREJUvaj6Hi

Malware Config

Targets

    • Target

      main.exe

    • Size

      17.9MB

    • MD5

      248c92d0adcc88f04e70e40b903a0d9c

    • SHA1

      186223029f3dc5c2976959fb5496e4b8028d00e0

    • SHA256

      24b6d7c91da49899ba9ef2815636c833c4ad78eb41e2683406a8f6470361abe5

    • SHA512

      8b55868382560d8174edc2f29ba2bb8a07fd71f99c0239c1b2010968a7c8458f60f0a18ce5cbe05cf72ca932fae945d65162be3aaec565b403dd48aef439cb07

    • SSDEEP

      393216:dqPnLFXlrVQMDOETgsvfGkgjTjXVvEK4l6HTzPq:kPLFXNVQREJUvaj6Hi

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks