General

  • Target

    dependices.exe

  • Size

    21.8MB

  • Sample

    250211-w57d6awlhl

  • MD5

    4f2b504074589822459f7f16fa34ff46

  • SHA1

    17c947f8f92ae66b2199adf2f2c889107fc663d0

  • SHA256

    73aa62687ed02328cd8720abcf044b4ea77ddd98b004b5b009db15d00dbcc08a

  • SHA512

    b5e941f5e91587661e6981e5c858a885f127f88a7f6e26faf48110642e648c4fda758e17b13c1f3b789e5433a50c51283faeaaa5f43606cdc6cb76eb9d27c5d1

  • SSDEEP

    393216:GqqPbs3CXIQscNurEUWjV7Ehc1JEnEH4I3Gqm7mZyupH7:qPbzXIQnNdbV7Z1kvZ7mZye7

Malware Config

Targets

    • Target

      dependices.exe

    • Size

      21.8MB

    • MD5

      4f2b504074589822459f7f16fa34ff46

    • SHA1

      17c947f8f92ae66b2199adf2f2c889107fc663d0

    • SHA256

      73aa62687ed02328cd8720abcf044b4ea77ddd98b004b5b009db15d00dbcc08a

    • SHA512

      b5e941f5e91587661e6981e5c858a885f127f88a7f6e26faf48110642e648c4fda758e17b13c1f3b789e5433a50c51283faeaaa5f43606cdc6cb76eb9d27c5d1

    • SSDEEP

      393216:GqqPbs3CXIQscNurEUWjV7Ehc1JEnEH4I3Gqm7mZyupH7:qPbzXIQnNdbV7Z1kvZ7mZye7

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks