General

  • Target

    Built.exe

  • Size

    17.2MB

  • Sample

    250105-dqm3vs1rgm

  • MD5

    22d8fb3fa3d84ef594fcb3c79ec32ddd

  • SHA1

    85cf5bef01fa9c8351c27ee5483547db0416635b

  • SHA256

    a9421eaa89003b63d8eac24f3dda7a3c2703b7db2ca67c551993fee035ea8594

  • SHA512

    525ac4b7e1014f7c5469180293fb2d4ba72729ca3011719fb817c809e9e01f77021f1ffe0e9e954dc7181b12f048743d784bb7518ef0ac3215ba70aa81ac8c8c

  • SSDEEP

    393216:VKr3uOPnAJR9jGFlbFNFBaREOND8jy/pWu4m5RimrbmyS:VKL5fAJnObFNbaRDIjy/pW2rS

Malware Config

Targets

    • Target

      Built.exe

    • Size

      17.2MB

    • MD5

      22d8fb3fa3d84ef594fcb3c79ec32ddd

    • SHA1

      85cf5bef01fa9c8351c27ee5483547db0416635b

    • SHA256

      a9421eaa89003b63d8eac24f3dda7a3c2703b7db2ca67c551993fee035ea8594

    • SHA512

      525ac4b7e1014f7c5469180293fb2d4ba72729ca3011719fb817c809e9e01f77021f1ffe0e9e954dc7181b12f048743d784bb7518ef0ac3215ba70aa81ac8c8c

    • SSDEEP

      393216:VKr3uOPnAJR9jGFlbFNFBaREOND8jy/pWu4m5RimrbmyS:VKL5fAJnObFNbaRDIjy/pW2rS

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks