General

  • Target

    dd212ed802189751acb803e758e231747bc0506fc0161db615b52e7579cf840d.msi

  • Size

    2.0MB

  • Sample

    250206-h8gq1szlgn

  • MD5

    05b777e864c9f032329acadbc747309b

  • SHA1

    e01e81d6103c13ce3a9399bb964f348dcdcf84d0

  • SHA256

    dd212ed802189751acb803e758e231747bc0506fc0161db615b52e7579cf840d

  • SHA512

    63af0bf4e924a8278f707006658413fb312c2f89907fa3740ed7604551724c4bc4cd9e1d249d0f91379ff45bca0d52da4f6a61dd041810785f5a07f353e3c2de

  • SSDEEP

    24576:Qt9cpVDh66xxNptbriMDYXrbxkxJ8ChMM5+Cy9Md9ymINKeRhV1IoAl+:PpRhzJptbriMDYXP2L8CC79hNKAVyf

Malware Config

Extracted

Family

metastealer

C2

kagkimuoakomksww.xyz

cwikwiiisuyqymso.xyz

qgimwqowkmuicoos.xyz

kuueskmwqmwoocuq.xyz

eaeueussigokssqg.xyz

eoyqkgcyoesysssk.xyz

ocmmqamiyucswwik.xyz

eimemucysaammomg.xyz

iwomsoekyisuymws.xyz

mqykiccmwokeumes.xyz

iqqcgqqseysecuum.xyz

iqmoyikmqymsmcwm.xyz

aseuqoqgaueaymyo.xyz

wycuamkomemmigmy.xyz

ceiyeqaoscmsamim.xyz

skcqkaykccckqyam.xyz

kaycmqwocuyyuqyg.xyz

mqssyaeoeeucegqy.xyz

ywqamawcqumaqiyq.xyz

skscsegicyqikqww.xyz

Attributes
  • dga_seed

    12914

  • domain_length

    16

  • num_dga_domains

    10000

  • port

    443

Targets

    • Target

      dd212ed802189751acb803e758e231747bc0506fc0161db615b52e7579cf840d.msi

    • Size

      2.0MB

    • MD5

      05b777e864c9f032329acadbc747309b

    • SHA1

      e01e81d6103c13ce3a9399bb964f348dcdcf84d0

    • SHA256

      dd212ed802189751acb803e758e231747bc0506fc0161db615b52e7579cf840d

    • SHA512

      63af0bf4e924a8278f707006658413fb312c2f89907fa3740ed7604551724c4bc4cd9e1d249d0f91379ff45bca0d52da4f6a61dd041810785f5a07f353e3c2de

    • SSDEEP

      24576:Qt9cpVDh66xxNptbriMDYXrbxkxJ8ChMM5+Cy9Md9ymINKeRhV1IoAl+:PpRhzJptbriMDYXP2L8CC79hNKAVyf

    • Meta Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • MetaStealer payload

    • Metastealer family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks