General

  • Target

    ByfronBP.exe

  • Size

    23.4MB

  • Sample

    250411-k7tejavqw7

  • MD5

    9ecdcd68f8ba8ee3590124b409175a99

  • SHA1

    c17f5267e05b167acb72280fdb01747fb1e20108

  • SHA256

    00729f82b26a8fca859a4aa9a718df03d2e1deaf57c93004dbecffb89ce2e970

  • SHA512

    13d257093572184d86ebe77f0067dba3b376d58ed25853af2fe95bd2d9b758892daaec64c9fc370797ec8c1b02f2e1a22e02509e6124f6d72627d228d08288d6

  • SSDEEP

    393216:FqPnLFXlrgzIxBZgQhMDOETgsvcGzCcgNi9ri77FHsZjOI0r06EPXYMZO:8PLFXNgkyQhREcciYM7WNF01EzY

Malware Config

Targets

    • Target

      ByfronBP.exe

    • Size

      23.4MB

    • MD5

      9ecdcd68f8ba8ee3590124b409175a99

    • SHA1

      c17f5267e05b167acb72280fdb01747fb1e20108

    • SHA256

      00729f82b26a8fca859a4aa9a718df03d2e1deaf57c93004dbecffb89ce2e970

    • SHA512

      13d257093572184d86ebe77f0067dba3b376d58ed25853af2fe95bd2d9b758892daaec64c9fc370797ec8c1b02f2e1a22e02509e6124f6d72627d228d08288d6

    • SSDEEP

      393216:FqPnLFXlrgzIxBZgQhMDOETgsvcGzCcgNi9ri77FHsZjOI0r06EPXYMZO:8PLFXNgkyQhREcciYM7WNF01EzY

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks