General

  • Target

    main.exe

  • Size

    17.9MB

  • Sample

    241207-yya4gswqbl

  • MD5

    a63bd4e602564cc972dbe79115ef82f4

  • SHA1

    35d29010f361ef281020562c150077acf0254079

  • SHA256

    f545cc2609bc5dfc9d42f077fd22b5fea41141c55f3a9b46b65c986367ab3954

  • SHA512

    28f39fb25fb8d770caa3c15c43447d77c66677954c01a3fa9ae0081152e250350c03f63fb85f50a8b971c8152995bd8dcd5332a9614539a3990237c8b4c547a7

  • SSDEEP

    393216:ZqPnLFXlrNQPDOETgsvfGCkgNYkHvEjpWrvqa2m:QPLFXNNQ6E0AYks0rvX

Malware Config

Targets

    • Target

      main.exe

    • Size

      17.9MB

    • MD5

      a63bd4e602564cc972dbe79115ef82f4

    • SHA1

      35d29010f361ef281020562c150077acf0254079

    • SHA256

      f545cc2609bc5dfc9d42f077fd22b5fea41141c55f3a9b46b65c986367ab3954

    • SHA512

      28f39fb25fb8d770caa3c15c43447d77c66677954c01a3fa9ae0081152e250350c03f63fb85f50a8b971c8152995bd8dcd5332a9614539a3990237c8b4c547a7

    • SSDEEP

      393216:ZqPnLFXlrNQPDOETgsvfGCkgNYkHvEjpWrvqa2m:QPLFXNNQ6E0AYks0rvX

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks