General

  • Target

    FlashBTC.exe

  • Size

    14.4MB

  • Sample

    250404-z7apraxlw7

  • MD5

    b02dd3b5fc68acf082a094b3318f1bd1

  • SHA1

    75d4b38d0d3711553d73949ffc4412dfe54340c0

  • SHA256

    f6365e1960122f4fb1775603b5ceb9798d5cc7aaf0e5c9e0b96fe4f1f1efe51d

  • SHA512

    8f524ee0d09df87a449f8758733adb0d529371d1b140cbdb0197563f8b954991a7ff5e9849d71bb662509eaf57d43c3dc94015cbe22354f5965239252ec34c26

  • SSDEEP

    393216:hX7QMidQuslSq99oWOv+9fgjmAVe+mGw:hLQ3dQuSDorvSYjmx+M

Malware Config

Targets

    • Target

      FlashBTC.exe

    • Size

      14.4MB

    • MD5

      b02dd3b5fc68acf082a094b3318f1bd1

    • SHA1

      75d4b38d0d3711553d73949ffc4412dfe54340c0

    • SHA256

      f6365e1960122f4fb1775603b5ceb9798d5cc7aaf0e5c9e0b96fe4f1f1efe51d

    • SHA512

      8f524ee0d09df87a449f8758733adb0d529371d1b140cbdb0197563f8b954991a7ff5e9849d71bb662509eaf57d43c3dc94015cbe22354f5965239252ec34c26

    • SSDEEP

      393216:hX7QMidQuslSq99oWOv+9fgjmAVe+mGw:hLQ3dQuSDorvSYjmx+M

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks