General

  • Target

    EAC BYPASS Paid.exe

  • Size

    18.7MB

  • Sample

    241130-t72wcayncw

  • MD5

    648c97eafe4de4a8bcd8decf592bb568

  • SHA1

    3639fd1a2c05c35e4177e9de302b124c04621b82

  • SHA256

    d1d884c04ff508d0b98dfbe2dcfb167feb63cd8a8708017664e54740ecddfa1d

  • SHA512

    6b2cbf76b76ec4c7c59695f38e30ad92c655ec2ac37b106fd6331f08fa22ae8f02ba8156bd623d871529af6ff5517d50ee4ab8d8356d6a3ac4d97613fdaefd57

  • SSDEEP

    393216:yqPnLFXlr4QMDOETgs77fGugztZLvE8s+ZgMkKq:3PLFXN4QRE7hUtZwsZy

Malware Config

Targets

    • Target

      EAC BYPASS Paid.exe

    • Size

      18.7MB

    • MD5

      648c97eafe4de4a8bcd8decf592bb568

    • SHA1

      3639fd1a2c05c35e4177e9de302b124c04621b82

    • SHA256

      d1d884c04ff508d0b98dfbe2dcfb167feb63cd8a8708017664e54740ecddfa1d

    • SHA512

      6b2cbf76b76ec4c7c59695f38e30ad92c655ec2ac37b106fd6331f08fa22ae8f02ba8156bd623d871529af6ff5517d50ee4ab8d8356d6a3ac4d97613fdaefd57

    • SSDEEP

      393216:yqPnLFXlr4QMDOETgs77fGugztZLvE8s+ZgMkKq:3PLFXN4QRE7hUtZwsZy

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks