General

  • Target

    Unconfirmed 114637.crdownload

  • Size

    17.8MB

  • Sample

    250103-clf83sxrdl

  • MD5

    bba5f6b2eb1f1f32f9b68e126cc269c7

  • SHA1

    dbf9e1e1f18632351119e2425a0fdc743d59a77b

  • SHA256

    d77ff2facd20566023a565d699b3e5f7bda96400c03540fa606063dfd29652d3

  • SHA512

    313e12972aa55825c1424fbbb498c8d2303b4475c69372ae9f6259bc545fcb0fa95c6c1a40ef452b18d863def504ee04f8411cd14c0f6171f96489fc87657379

  • SSDEEP

    393216:fqPnLFXlriQ8DOETgsvfGDgKwA/vE4Q0DH9tm:yPLFXNiQhEgCAEYDi

Malware Config

Targets

    • Target

      Unconfirmed 114637.crdownload

    • Size

      17.8MB

    • MD5

      bba5f6b2eb1f1f32f9b68e126cc269c7

    • SHA1

      dbf9e1e1f18632351119e2425a0fdc743d59a77b

    • SHA256

      d77ff2facd20566023a565d699b3e5f7bda96400c03540fa606063dfd29652d3

    • SHA512

      313e12972aa55825c1424fbbb498c8d2303b4475c69372ae9f6259bc545fcb0fa95c6c1a40ef452b18d863def504ee04f8411cd14c0f6171f96489fc87657379

    • SSDEEP

      393216:fqPnLFXlriQ8DOETgsvfGDgKwA/vE4Q0DH9tm:yPLFXNiQhEgCAEYDi

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      main.pyc

    • Size

      7KB

    • MD5

      16bdd64200062f73c3360e7062f57946

    • SHA1

      50acece38db62937896c5471f542be7b425e5374

    • SHA256

      662679ab9b492cfb82820d29100411e13c4da8357a12b1c2689aebe821dda803

    • SHA512

      35b3dccd0a005b0edaa3da4c622e0a589cf824ab957f5db33b23616b116afdc2f15d9a0fc5d8d69f5f8265ec3ae873acf69cd54f05b55070a8bde15db230f67e

    • SSDEEP

      192:wMvm8bD8GMvWdXwo3ThpJimk2JhwGtEnMdwoYxnw:Vm8EvWuSTZbp2jPhxw

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks