General

  • Target

    Launcher Damned.exe

  • Size

    18.5MB

  • Sample

    250412-qnxwhawscv

  • MD5

    ba58455f670f122d0d9c6f884471642f

  • SHA1

    b22f96bee35b83534c93e39842669059cd731498

  • SHA256

    fb635b892c16158d461da49333ef1abd0f9f40c23319a383f661976fd63a06e8

  • SHA512

    fb0249f8446551c682d114e6ae4cccb804c634a6c8affc89d4e3a136d758319caf634dbb6afb45a355c89a29b5b14a4cc0a3262330e1cfb89d5a5105942a966e

  • SSDEEP

    393216:IqPnLFXlr8gQpDOETgsvfGggtmHFvE4tYJOvLq:5PLFXNlQoENSNwz

Malware Config

Targets

    • Target

      Launcher Damned.exe

    • Size

      18.5MB

    • MD5

      ba58455f670f122d0d9c6f884471642f

    • SHA1

      b22f96bee35b83534c93e39842669059cd731498

    • SHA256

      fb635b892c16158d461da49333ef1abd0f9f40c23319a383f661976fd63a06e8

    • SHA512

      fb0249f8446551c682d114e6ae4cccb804c634a6c8affc89d4e3a136d758319caf634dbb6afb45a355c89a29b5b14a4cc0a3262330e1cfb89d5a5105942a966e

    • SSDEEP

      393216:IqPnLFXlr8gQpDOETgsvfGggtmHFvE4tYJOvLq:5PLFXNlQoENSNwz

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks