Resubmissions

20-01-2025 21:11

250120-z11mlazkay 10

General

  • Target

    migi executor.exe

  • Size

    18.7MB

  • Sample

    250120-z11mlazkay

  • MD5

    3a66a83ecef69daac067702af44a9e83

  • SHA1

    4d30fa21271cf558245782af2c6ed168b7670a26

  • SHA256

    cf7603c14aa7babc5b4ee4be69bd7a561cbe3ba8e192cbc1b0135b01b7d84c9c

  • SHA512

    9e26a6dc8bc10f4990351b4e230c22ed6a59bf3f1a7536d6999cc9404d4445c02073beb425ec4f2478cd453a8414e541a6fb3f0f14f6a1652f8ac230c876ba4d

  • SSDEEP

    393216:eqPnLFXlrgUgQpDOETgsvfG7gxwB9LvE4+Zyj4Lg:TPLFXNgtQoEEoQOWO

Malware Config

Targets

    • Target

      migi executor.exe

    • Size

      18.7MB

    • MD5

      3a66a83ecef69daac067702af44a9e83

    • SHA1

      4d30fa21271cf558245782af2c6ed168b7670a26

    • SHA256

      cf7603c14aa7babc5b4ee4be69bd7a561cbe3ba8e192cbc1b0135b01b7d84c9c

    • SHA512

      9e26a6dc8bc10f4990351b4e230c22ed6a59bf3f1a7536d6999cc9404d4445c02073beb425ec4f2478cd453a8414e541a6fb3f0f14f6a1652f8ac230c876ba4d

    • SSDEEP

      393216:eqPnLFXlrgUgQpDOETgsvfG7gxwB9LvE4+Zyj4Lg:TPLFXNgtQoEEoQOWO

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks