Resubmissions

18-01-2025 10:50

250118-mw82yssjhl 10

18-01-2025 10:48

250118-mwmhys1lgt 10

General

  • Target

    AIO.exe

  • Size

    7.6MB

  • Sample

    250118-mw82yssjhl

  • MD5

    0d49bc0688632e3baafc053f81fae52c

  • SHA1

    5c46d123ed6a5b30bf29f9003e4a2bfcaafe7b51

  • SHA256

    785ec7bfd5410ec975a10bf335557354686c4d3de26aedabefc0913f4ba1b76f

  • SHA512

    97163263b09a90f4e88295dd59f3fb15693b76d97dbe8e3fa7deae231236b46d9824c3276cde3ca281aeab52176b5dd2f8e31c22057edf406c54e258cb5cdece

  • SSDEEP

    196608:7HV1Fc6ZB6ylnlPzf+JiJCsmFMveOn6hqgdhI:NcSBRlnlPSa7mmveOpgdhI

Malware Config

Targets

    • Target

      AIO.exe

    • Size

      7.6MB

    • MD5

      0d49bc0688632e3baafc053f81fae52c

    • SHA1

      5c46d123ed6a5b30bf29f9003e4a2bfcaafe7b51

    • SHA256

      785ec7bfd5410ec975a10bf335557354686c4d3de26aedabefc0913f4ba1b76f

    • SHA512

      97163263b09a90f4e88295dd59f3fb15693b76d97dbe8e3fa7deae231236b46d9824c3276cde3ca281aeab52176b5dd2f8e31c22057edf406c54e258cb5cdece

    • SSDEEP

      196608:7HV1Fc6ZB6ylnlPzf+JiJCsmFMveOn6hqgdhI:NcSBRlnlPSa7mmveOpgdhI

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks