Resubmissions

12-01-2025 19:09

250112-xt3r9svmgs 10

12-01-2025 14:22

250112-rplqasykdq 10

12-01-2025 14:19

250112-rmx1jsvrcy 10

12-01-2025 13:18

250112-qj8gfawmhk 10

12-01-2025 12:58

250112-p7nlhasrds 10

General

  • Target

    DoxerV7.exe

  • Size

    19.6MB

  • Sample

    250112-xt3r9svmgs

  • MD5

    9cd3c54cd577301cc4bfa6793e23563f

  • SHA1

    064231143d1bb4a793a348d79a3ca2d300bfb417

  • SHA256

    28bd3dc04da389e62f5dc987c5f11d70446d20eb270affc42f212972233a60ab

  • SHA512

    bdc4a5a13d9e17d1d637a9af1bb5a15ccd03e2f31b9915017cadce7e151bc54f388c320e45e46fd5b6b69517ac7abf3262ff455fa2aa4b3d609c348b0b93a93b

  • SSDEEP

    393216:Su7L/1a/vUI/5DfDg8Qzc65FMMBgCqEJ6Zj+dCDMOAql:SCLdad5b08QwwMMBS5NAkb

Malware Config

Targets

    • Target

      DoxerV7.exe

    • Size

      19.6MB

    • MD5

      9cd3c54cd577301cc4bfa6793e23563f

    • SHA1

      064231143d1bb4a793a348d79a3ca2d300bfb417

    • SHA256

      28bd3dc04da389e62f5dc987c5f11d70446d20eb270affc42f212972233a60ab

    • SHA512

      bdc4a5a13d9e17d1d637a9af1bb5a15ccd03e2f31b9915017cadce7e151bc54f388c320e45e46fd5b6b69517ac7abf3262ff455fa2aa4b3d609c348b0b93a93b

    • SSDEEP

      393216:Su7L/1a/vUI/5DfDg8Qzc65FMMBgCqEJ6Zj+dCDMOAql:SCLdad5b08QwwMMBS5NAkb

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks