General

  • Target

    luncher.exe

  • Size

    14.4MB

  • Sample

    250222-15qtma1kam

  • MD5

    53c2997ea469d03c7e4162194e76c5c1

  • SHA1

    6cb592df6269f95de328c744498ad54a490cde54

  • SHA256

    f13b643cafe7e49fe2a71f8f3ae47506035b9faee0d39f05002fa85d82258135

  • SHA512

    2420d11765944c7d755de527fe4203588f3b9de641eb37088e4fee80a01ff96ecd050b83adbfc3e252004cef121c784842d39869d9664863c107d720af1a1576

  • SSDEEP

    393216:eu7L/sQPndQuslSq9RoWOv+9fggkD8ejQaE:eCL0QPndQuSborvSYgi70

Malware Config

Targets

    • Target

      luncher.exe

    • Size

      14.4MB

    • MD5

      53c2997ea469d03c7e4162194e76c5c1

    • SHA1

      6cb592df6269f95de328c744498ad54a490cde54

    • SHA256

      f13b643cafe7e49fe2a71f8f3ae47506035b9faee0d39f05002fa85d82258135

    • SHA512

      2420d11765944c7d755de527fe4203588f3b9de641eb37088e4fee80a01ff96ecd050b83adbfc3e252004cef121c784842d39869d9664863c107d720af1a1576

    • SSDEEP

      393216:eu7L/sQPndQuslSq9RoWOv+9fggkD8ejQaE:eCL0QPndQuSborvSYgi70

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks