General

  • Target

    LauncherDamned.exe

  • Size

    18.5MB

  • Sample

    250412-qrv63swtbv

  • MD5

    ba58455f670f122d0d9c6f884471642f

  • SHA1

    b22f96bee35b83534c93e39842669059cd731498

  • SHA256

    fb635b892c16158d461da49333ef1abd0f9f40c23319a383f661976fd63a06e8

  • SHA512

    fb0249f8446551c682d114e6ae4cccb804c634a6c8affc89d4e3a136d758319caf634dbb6afb45a355c89a29b5b14a4cc0a3262330e1cfb89d5a5105942a966e

  • SSDEEP

    393216:IqPnLFXlr8gQpDOETgsvfGggtmHFvE4tYJOvLq:5PLFXNlQoENSNwz

Malware Config

Targets

    • Target

      LauncherDamned.exe

    • Size

      18.5MB

    • MD5

      ba58455f670f122d0d9c6f884471642f

    • SHA1

      b22f96bee35b83534c93e39842669059cd731498

    • SHA256

      fb635b892c16158d461da49333ef1abd0f9f40c23319a383f661976fd63a06e8

    • SHA512

      fb0249f8446551c682d114e6ae4cccb804c634a6c8affc89d4e3a136d758319caf634dbb6afb45a355c89a29b5b14a4cc0a3262330e1cfb89d5a5105942a966e

    • SSDEEP

      393216:IqPnLFXlr8gQpDOETgsvfGggtmHFvE4tYJOvLq:5PLFXNlQoENSNwz

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.