General

  • Target

    graber.exe

  • Size

    18.7MB

  • Sample

    241212-zpw52axkfv

  • MD5

    804713407f9f63c8094c3743d7dd612c

  • SHA1

    197a35da3d7524835248c5d6d057a6819dc22de9

  • SHA256

    491d11187e9142e7fbe6a544b5c3a76fb1dee634e9c8bcf8453089da27355639

  • SHA512

    8aca6fa9666330a76cc4d57b554ff62ed22e866b60e5514d494ece0a1215d3b4ea5deb7a424e07943bf36bff8a797191d230c6cbb1d9e7abd087700c471ec5ee

  • SSDEEP

    393216:JqPnLFXlrcQMDOETgs77fGUga0H+vEXsYzrlifq:APLFXNcQRE7/yXcwrz

Malware Config

Targets

    • Target

      graber.exe

    • Size

      18.7MB

    • MD5

      804713407f9f63c8094c3743d7dd612c

    • SHA1

      197a35da3d7524835248c5d6d057a6819dc22de9

    • SHA256

      491d11187e9142e7fbe6a544b5c3a76fb1dee634e9c8bcf8453089da27355639

    • SHA512

      8aca6fa9666330a76cc4d57b554ff62ed22e866b60e5514d494ece0a1215d3b4ea5deb7a424e07943bf36bff8a797191d230c6cbb1d9e7abd087700c471ec5ee

    • SSDEEP

      393216:JqPnLFXlrcQMDOETgs77fGUga0H+vEXsYzrlifq:APLFXNcQRE7/yXcwrz

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks