General

  • Target

    Hider.exe

  • Size

    18.0MB

  • Sample

    250324-1aj3lawwdv

  • MD5

    50f8fa0d40c34bc05fa2c761e77da5aa

  • SHA1

    a0ea97c3f2b290270749fdfffcf55a0211e4d789

  • SHA256

    6ac7946f47c3da13a0bf58f8e762487105ab3b18c72c59e9f51f18f97d3b4fd6

  • SHA512

    7ae554014e46d57ed1d347b88c5e3a105820505577e4db594372afa914143dccfd251d969d1453e2aa0a1f504b7600e72104e01af4699566bf2f65efa7f91938

  • SSDEEP

    393216:bqPnLFXlr2QHZZDOETgsvfGCGZgadMcvE/r/Qd1q:uPLFXN2Q54EkRM17d

Malware Config

Targets

    • Target

      Hider.exe

    • Size

      18.0MB

    • MD5

      50f8fa0d40c34bc05fa2c761e77da5aa

    • SHA1

      a0ea97c3f2b290270749fdfffcf55a0211e4d789

    • SHA256

      6ac7946f47c3da13a0bf58f8e762487105ab3b18c72c59e9f51f18f97d3b4fd6

    • SHA512

      7ae554014e46d57ed1d347b88c5e3a105820505577e4db594372afa914143dccfd251d969d1453e2aa0a1f504b7600e72104e01af4699566bf2f65efa7f91938

    • SSDEEP

      393216:bqPnLFXlr2QHZZDOETgsvfGCGZgadMcvE/r/Qd1q:uPLFXN2Q54EkRM17d

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks