General

  • Target

    Downloads.exe

  • Size

    30.1MB

  • Sample

    250331-swv3zsvpv7

  • MD5

    3527394cee3cfcd95e2bbdf5ba96ac55

  • SHA1

    057e1a52a005fab9c7ca6c2017e87f0d4fdd6ff4

  • SHA256

    3f86bf5632410fe5b71c8ec8167c6d44b6dbf2f6dbd2c304a44cae15351efc45

  • SHA512

    00343c29ab6113f2d44c663b25efc4c8d234e68e1ff282a70071a55bdf47e1310cd6ffb5961f0f8a073b8f3acf242c25c7bbd9881e860c66362effba12042d86

  • SSDEEP

    786432:gumFxGF3khP1kGYJh5WcR0SGnCP+RFYwrF08f3l3Dd:guUGUPCJnWqDP+RFV3Vd

Malware Config

Targets

    • Target

      Downloads.exe

    • Size

      30.1MB

    • MD5

      3527394cee3cfcd95e2bbdf5ba96ac55

    • SHA1

      057e1a52a005fab9c7ca6c2017e87f0d4fdd6ff4

    • SHA256

      3f86bf5632410fe5b71c8ec8167c6d44b6dbf2f6dbd2c304a44cae15351efc45

    • SHA512

      00343c29ab6113f2d44c663b25efc4c8d234e68e1ff282a70071a55bdf47e1310cd6ffb5961f0f8a073b8f3acf242c25c7bbd9881e860c66362effba12042d86

    • SSDEEP

      786432:gumFxGF3khP1kGYJh5WcR0SGnCP+RFYwrF08f3l3Dd:guUGUPCJnWqDP+RFV3Vd

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks