General

  • Target

    Rich Executor.exe

  • Size

    43.7MB

  • Sample

    250115-vee2jsymbx

  • MD5

    9ea83877b34498a14a09c2b92d22da07

  • SHA1

    ec4a7198ed02a90a22e1533a93920e0cc874414a

  • SHA256

    fd448595fb053e5ea6cf7b213472e4c900ff8203d6c30dd5e4d19609c00573d1

  • SHA512

    6946ce4887d619d12af133382b71f1c344bf11a628979f63c62063557ea3a5df8a9348c533625dc7e7ab2533aee20a4e05471ecf2c9889ef621c00e2611ba6ad

  • SSDEEP

    786432:A6VLkOzcY876nBBsi6/9x9ta9eyq8OThzvcdpJ0q8TPZUd3GfpW6NGsjWzunE1Wo:DVYeE7MBBsiYweyJulZUdg0CWzH1O3

Malware Config

Targets

    • Target

      Rich Executor.exe

    • Size

      43.7MB

    • MD5

      9ea83877b34498a14a09c2b92d22da07

    • SHA1

      ec4a7198ed02a90a22e1533a93920e0cc874414a

    • SHA256

      fd448595fb053e5ea6cf7b213472e4c900ff8203d6c30dd5e4d19609c00573d1

    • SHA512

      6946ce4887d619d12af133382b71f1c344bf11a628979f63c62063557ea3a5df8a9348c533625dc7e7ab2533aee20a4e05471ecf2c9889ef621c00e2611ba6ad

    • SSDEEP

      786432:A6VLkOzcY876nBBsi6/9x9ta9eyq8OThzvcdpJ0q8TPZUd3GfpW6NGsjWzunE1Wo:DVYeE7MBBsiYweyJulZUdg0CWzH1O3

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      discord_token_grabber.pyc

    • Size

      15KB

    • MD5

      143e1ca54a6631128428c6bf7515cfd2

    • SHA1

      b560459179c580bb22f5adc24f4b3b5851c4f1ad

    • SHA256

      25cb908eb359f31428c9932d4f98df7f2ee647d3339ea9a7c86ad281b03d8c4f

    • SHA512

      bc94451702fbe45339999569a1b5935ff2f1daebce10188305995364e047bc19582ba7077d4ab6ceb3cf1c5f21438c3b76416a2b45a0284fbd679c029bc51d35

    • SSDEEP

      384:nGC7RYmnXavkLPJrltcshntQ5saa2holHVA:nGCuvkL9ltcsttQ5saaCgHVA

    Score
    3/10
    • Target

      get_cookies.pyc

    • Size

      9KB

    • MD5

      32bb8ed84a18f665d03dd5afbc7b65b0

    • SHA1

      a2129ec6568e20c620429d884a13cd4671504a2b

    • SHA256

      7d9fff7c91679c94728b83eeabc34f54201fc9ee6fa6806665b25007ce5b88a6

    • SHA512

      399198dfac2fd7bdea480d93d836c2f194ae9c93d7ee7855537cac44bf7c6e463a8104f7f7380b9f075fdd67bb12027909ce2d3407b5423d2837a96c3c835bc2

    • SSDEEP

      192:lNaBBeiNR9QfUF2x3NC79F21aG67+DAhN:lPiT2XtFcjKDAhN

    Score
    3/10
    • Target

      misc.pyc

    • Size

      4KB

    • MD5

      c42e089e863f6e8137098c45fceab40e

    • SHA1

      6518578e7b5f2480492334238b84ad3be5b1380c

    • SHA256

      62c5f58bfd4b9cee38e6b973ed8000eda063488096380acf6ab7264f8c1df76c

    • SHA512

      9e8ccd4383728166faf22c3f10fd471388ef8084c5e000e9fe58241c6ef4b9abd23a29de032a69a332ff41c852fcf786941ccf4ddfac1b4cb28b6251ab4942f5

    • SSDEEP

      96:XSMlhlvyznDweHPF8+VB7sHIZGQSWfvmyyZ1k9zhub:iolvyz8evq+VBXZGQlvmV1k5hub

    Score
    3/10
    • Target

      passwords_grabber.pyc

    • Size

      7KB

    • MD5

      d23a91aebc53fb0d013c182fc10a569e

    • SHA1

      2fe4680de0ddafad84c4cf69d5427674ee2f49d9

    • SHA256

      5fd25ed5ea1de4064160ee4559dfba63fe1e4b86fd631c388581ddebfc975b7d

    • SHA512

      97c4aeb2d64469d6d469066bfa24135ad9351f79cbafe5f97ccdbc4e8d759684789f10efe08f50db0d33b8a923b0d9bb6c4ad6d49aadc938472781fd37ca0024

    • SSDEEP

      192:A114qWLlhuUIxDPK2cMHJb+XUhitovgEuz:64qWLlMFyVMHAE/4

    Score
    3/10
    • Target

      source_prepared.pyc

    • Size

      138KB

    • MD5

      f4e5b6105bb4ae54879935815ce4449b

    • SHA1

      9e1c6bec369eee4cd8783df6a204478fc8ec8222

    • SHA256

      dc9001804bafedc40781d29b9fa8f4338b55e1d8eea8140f30497ce6e5b82800

    • SHA512

      51944b525ada708ffa9a479281199b3ecb460bf3a1f08fbaa52a4024dba8e73088f00ad0c3b8d80d6133a3cfcea82c1a1655ef5b78332879d438557a5aac9b5f

    • SSDEEP

      3072:NgNT/OOUNtRlyUbHeo7PZTjc5JqHzNCIvdXzQcsThC:QT/OOUNtReoxMITNbsI

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks