General

  • Target

    Starlight Checker.exe

  • Size

    17.8MB

  • Sample

    250102-dmcgyssmgj

  • MD5

    7390669f27c610c2bc8bf4c47939f3c5

  • SHA1

    1a65235107b61b6a2e82e4cbd761ba01c8765302

  • SHA256

    25c37917cff6a0c6be979b2b13487b1fed169d2f4e6d321a0467150675982492

  • SHA512

    8a6ba203efdadc564b8dfe2815e944e46dc850ca8bc86bcab2cf30b8f7ac092c42cb7edf01b65b7a06205e8de45df5214539508af7b5a9e9488bd4c26dd5ddf4

  • SSDEEP

    393216:9qPnLFXlrPmQ8DOETgsvfGFGgSjvEEF9ggcYkq:EPLFXNOQhE9RI6gM

Malware Config

Targets

    • Target

      Starlight Checker.exe

    • Size

      17.8MB

    • MD5

      7390669f27c610c2bc8bf4c47939f3c5

    • SHA1

      1a65235107b61b6a2e82e4cbd761ba01c8765302

    • SHA256

      25c37917cff6a0c6be979b2b13487b1fed169d2f4e6d321a0467150675982492

    • SHA512

      8a6ba203efdadc564b8dfe2815e944e46dc850ca8bc86bcab2cf30b8f7ac092c42cb7edf01b65b7a06205e8de45df5214539508af7b5a9e9488bd4c26dd5ddf4

    • SSDEEP

      393216:9qPnLFXlrPmQ8DOETgsvfGFGgSjvEEF9ggcYkq:EPLFXNOQhE9RI6gM

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks