Resubmissions

07-01-2025 19:20

250107-x14m5swqdr 1

06-01-2025 20:49

250106-zmb23szjgp 8

06-01-2025 20:34

250106-zcfyaayqbp 10

06-01-2025 20:12

250106-yyyjsawpbs 10

General

  • Target

    Resolute 16x.mcpack

  • Size

    7.6MB

  • Sample

    250106-zmb23szjgp

  • MD5

    b9e57b369a3b919d3d2513db78dd29fe

  • SHA1

    a60a15aeae76b01d9b026650ebdb02bd05cb3412

  • SHA256

    c6004a404cddb4408610b0394b3c133ad1c1bfe5eee08aa5f2836969230612db

  • SHA512

    3e19eb776d11dc4d08c606a28733cd7118f464f01ff08ae1612d08aababb6e18087d0351004012cd34c2ec24c5a91b834d9623a880d32d3efc7999810479840b

  • SSDEEP

    196608:zCPskbMDiJmVU0qsmIuAfdJ8ZHnp3/XFOfOgtk6O:zCbki/0qEFetnp3/XF4OZ

Malware Config

Targets

    • Target

      Resolute 16x/credits.txt

    • Size

      451B

    • MD5

      600ff9e89d20b6658661a0fe55c71d26

    • SHA1

      559580d80dbb3227fc01c0058181dad568018d1f

    • SHA256

      3a6a84b05e304f0457c009003c752f9b87e1ab9c9af930ef418454f2b4f632f8

    • SHA512

      d9955d1e4b0fb1dfda63fe700e9ec0c8fdd5635de6e0b10a60c58ee6b1c275754f3a6cb780c478b4dabc1484312ccc9be79ab3ffe889a44ed0ecc015881be0b0

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks