General

  • Target

    frameskip.exe

  • Size

    17.9MB

  • Sample

    241210-a5mh4asmgk

  • MD5

    b2bd3919426bb4bf8b8371954fa2ba6d

  • SHA1

    991d1093900c1b1e3baa1ff2c4b99f5ede7c7ddd

  • SHA256

    62c13043ea5275fa54a2f64b5874a229d2ea75d62664426d5fc6116f79e88680

  • SHA512

    893a49bd6b3b1b6b481da5176cab17163dd98c96a4d2f8a5e61c4f0fe29582c778f46af3e19cdb53d0f77e3aecc4462bb428f1461519d322d269b38ba064f21f

  • SSDEEP

    393216:6qPnLFXlrNQPDOETgsvfGkgoiHvEd8miF/Wq:PPLFXNNQ6E5lisPi5

Malware Config

Targets

    • Target

      frameskip.exe

    • Size

      17.9MB

    • MD5

      b2bd3919426bb4bf8b8371954fa2ba6d

    • SHA1

      991d1093900c1b1e3baa1ff2c4b99f5ede7c7ddd

    • SHA256

      62c13043ea5275fa54a2f64b5874a229d2ea75d62664426d5fc6116f79e88680

    • SHA512

      893a49bd6b3b1b6b481da5176cab17163dd98c96a4d2f8a5e61c4f0fe29582c778f46af3e19cdb53d0f77e3aecc4462bb428f1461519d322d269b38ba064f21f

    • SSDEEP

      393216:6qPnLFXlrNQPDOETgsvfGkgoiHvEd8miF/Wq:PPLFXNNQ6E5lisPi5

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks