General

  • Target

    Setup_Filr_ver.12.4.exe

  • Size

    7.6MB

  • Sample

    250104-js811azqct

  • MD5

    90ee30fccafac811f40981a0e895d7f0

  • SHA1

    1517871794b795207d8cfa243c44bda048dcf40d

  • SHA256

    f139e085653967253d9a7159a3664dd986a69570540375d39a10df1fa49b8fe4

  • SHA512

    107884f27703328249e5962ca2a58740a511238392ddd5227ed663409c36113c881c8f688b12d3dcdd69f7946da45ef80df04335245adbb2c64e214a5729401b

  • SSDEEP

    196608:7UHYfwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q9VMwICEc/XO:0IHziK1piXLGVE4Ue9VJG

Malware Config

Targets

    • Target

      Setup_Filr_ver.12.4.exe

    • Size

      7.6MB

    • MD5

      90ee30fccafac811f40981a0e895d7f0

    • SHA1

      1517871794b795207d8cfa243c44bda048dcf40d

    • SHA256

      f139e085653967253d9a7159a3664dd986a69570540375d39a10df1fa49b8fe4

    • SHA512

      107884f27703328249e5962ca2a58740a511238392ddd5227ed663409c36113c881c8f688b12d3dcdd69f7946da45ef80df04335245adbb2c64e214a5729401b

    • SSDEEP

      196608:7UHYfwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q9VMwICEc/XO:0IHziK1piXLGVE4Ue9VJG

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks