General

  • Target

    main.exe

  • Size

    17.6MB

  • Sample

    241205-qqlk9awnh1

  • MD5

    4edced436524b16a1f5eaeaf7d182346

  • SHA1

    e2626eacc78d6573d7696407f0de1db5be040135

  • SHA256

    a0c2878314622706025c60f880d11c7af08b2900e9603d580d9cfd6544599d71

  • SHA512

    45b26f06998c2085c14c2d2825b540458be65916a869d77eb360228ceacc7ae303f3ad581075d8c046640c5093102a2c31b91692f69fd5af2fd4f753c22c4ded

  • SSDEEP

    393216:DqPnLFXlr8gQpDOETgsvfG9wagqKvECk6C1uAL9q:GPLFXNlQoEM1jaC1u2o

Malware Config

Targets

    • Target

      main.exe

    • Size

      17.6MB

    • MD5

      4edced436524b16a1f5eaeaf7d182346

    • SHA1

      e2626eacc78d6573d7696407f0de1db5be040135

    • SHA256

      a0c2878314622706025c60f880d11c7af08b2900e9603d580d9cfd6544599d71

    • SHA512

      45b26f06998c2085c14c2d2825b540458be65916a869d77eb360228ceacc7ae303f3ad581075d8c046640c5093102a2c31b91692f69fd5af2fd4f753c22c4ded

    • SSDEEP

      393216:DqPnLFXlr8gQpDOETgsvfG9wagqKvECk6C1uAL9q:GPLFXNlQoEM1jaC1u2o

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks