General

  • Target

    Built.exe

  • Size

    17.8MB

  • Sample

    241221-j5qp7awngz

  • MD5

    85a20b1130f97555855654ebad623678

  • SHA1

    eceb6b17e5115ed302193ecdc4e80cf362ba086e

  • SHA256

    23b550ae22c1849ae209562e61ed13f6411532c8d9655c5c012641b14004de4b

  • SHA512

    0bc80d39de5b4a29366c15726010986c312634c774727e6cfc842a36437e5b0a5edf6e151f73b80f17bcee43c215bcafc6b50d2069c61ee1146b87291d3a4083

  • SSDEEP

    393216:hqPnLFXlrWQ8DOETgsvfG7gsNvEvpc2R20Imm:IPLFXNWQhEiFiv2G2T

Malware Config

Targets

    • Target

      Built.exe

    • Size

      17.8MB

    • MD5

      85a20b1130f97555855654ebad623678

    • SHA1

      eceb6b17e5115ed302193ecdc4e80cf362ba086e

    • SHA256

      23b550ae22c1849ae209562e61ed13f6411532c8d9655c5c012641b14004de4b

    • SHA512

      0bc80d39de5b4a29366c15726010986c312634c774727e6cfc842a36437e5b0a5edf6e151f73b80f17bcee43c215bcafc6b50d2069c61ee1146b87291d3a4083

    • SSDEEP

      393216:hqPnLFXlrWQ8DOETgsvfG7gsNvEvpc2R20Imm:IPLFXNWQhEiFiv2G2T

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks