General

  • Target

    Built.exe

  • Size

    8.3MB

  • Sample

    250112-2j96taspgy

  • MD5

    ea8e5e5535baed2e0a420f1c8506bcbe

  • SHA1

    314af0520a9c8f8c52fa6f19e7aa3c74e2dbcbdb

  • SHA256

    c7ee8d28269b3ac9e0d88daf4bbd5ccdd3570f638dca625a77eeee4b48e5aa7e

  • SHA512

    bc7eb4d24f4746e16ffe17f159f46eec9a3c3aab3ebe7199d0d440df556ea45560c7808e306d4a208da546c165683f76acfb6f2cf863bc46a17b9078ced174ab

  • SSDEEP

    196608:vkuYhwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jc:pIHziK1piXLGVE4UrS0VJg

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.3MB

    • MD5

      ea8e5e5535baed2e0a420f1c8506bcbe

    • SHA1

      314af0520a9c8f8c52fa6f19e7aa3c74e2dbcbdb

    • SHA256

      c7ee8d28269b3ac9e0d88daf4bbd5ccdd3570f638dca625a77eeee4b48e5aa7e

    • SHA512

      bc7eb4d24f4746e16ffe17f159f46eec9a3c3aab3ebe7199d0d440df556ea45560c7808e306d4a208da546c165683f76acfb6f2cf863bc46a17b9078ced174ab

    • SSDEEP

      196608:vkuYhwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jc:pIHziK1piXLGVE4UrS0VJg

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks