General

  • Target

    main.exe

  • Size

    21.3MB

  • Sample

    250327-xnjgfawyfs

  • MD5

    515af45a33fa20e3ca9c2dd8af26173a

  • SHA1

    2808e1c0abbe4ceb5f6dbc28d3ae7324a4a916b4

  • SHA256

    26e339ac703a76ffe511176ecd7cf51507ed1510fdb28bf5b43cde652cf133cb

  • SHA512

    539a3eefef4d5514d6e04d5aa17aa143a985b6d80d7926eb8d2f0be279aeac05c47ab5693a6fcdbfd26ac8b57ae564b0f77c725300cdd94943804ab1469b7e90

  • SSDEEP

    393216:WqPnLFXlrlKjEG5QKZDOETgsvfG37Kga2tysvE4gFV6G7Km:7PLFXNllG5QK4ExmtyFtkE

Malware Config

Targets

    • Target

      main.exe

    • Size

      21.3MB

    • MD5

      515af45a33fa20e3ca9c2dd8af26173a

    • SHA1

      2808e1c0abbe4ceb5f6dbc28d3ae7324a4a916b4

    • SHA256

      26e339ac703a76ffe511176ecd7cf51507ed1510fdb28bf5b43cde652cf133cb

    • SHA512

      539a3eefef4d5514d6e04d5aa17aa143a985b6d80d7926eb8d2f0be279aeac05c47ab5693a6fcdbfd26ac8b57ae564b0f77c725300cdd94943804ab1469b7e90

    • SSDEEP

      393216:WqPnLFXlrlKjEG5QKZDOETgsvfG37Kga2tysvE4gFV6G7Km:7PLFXNllG5QK4ExmtyFtkE

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.