General

  • Target

    Setup.exe

  • Size

    17.7MB

  • Sample

    250214-e4se6sskem

  • MD5

    b49f0b18c69a1bfc3e74427c2f20a09d

  • SHA1

    0e865ce79544e3cd81b166e5084ad5574810bec7

  • SHA256

    78e09c38519b02a2a521cf26f2bfae3aaeb4dd4de15cc63b547c6d772b4e8fc9

  • SHA512

    6999eb7ce66990cffe62f6ff566459c38fe52f4acbf4b92b3b1d254670272ed7cf1b77bbd3d8fb5a38e02613bf94caba68a245ded85dbde05c1f4b8eb1838b90

  • SSDEEP

    393216:EqPnLFXlrSQ8DOETgsvfGHge9gvEMdUUIVq:lPLFXNSQhEs/9ZVUf

Malware Config

Targets

    • Target

      Setup.exe

    • Size

      17.7MB

    • MD5

      b49f0b18c69a1bfc3e74427c2f20a09d

    • SHA1

      0e865ce79544e3cd81b166e5084ad5574810bec7

    • SHA256

      78e09c38519b02a2a521cf26f2bfae3aaeb4dd4de15cc63b547c6d772b4e8fc9

    • SHA512

      6999eb7ce66990cffe62f6ff566459c38fe52f4acbf4b92b3b1d254670272ed7cf1b77bbd3d8fb5a38e02613bf94caba68a245ded85dbde05c1f4b8eb1838b90

    • SSDEEP

      393216:EqPnLFXlrSQ8DOETgsvfGHge9gvEMdUUIVq:lPLFXNSQhEs/9ZVUf

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks