General

  • Target

    630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.zip

  • Size

    236KB

  • Sample

    240114-v7vbyachg2

  • MD5

    8d78ffb82e77fcf49abb4e2a58ecb0a5

  • SHA1

    b7ab16641262b614977aa734bb49ab16b76c6373

  • SHA256

    e6d2263dcddfe0472da3643b0cf91781d86321fe7c731721e43a8d3ef6fa474d

  • SHA512

    27a4f204ab714610590e482b83b9dfb036cb5bcb139dcd779496c5ece6f575ca9554f51b28e4fa66a9ecf7bf8fbbeb7074bc3d7c0480b4d47d324f0e910d8528

  • SSDEEP

    6144:UWQRWp4QwcSwGHmPBjFzZrFwsGnTbF7VzC4v1v1kzvT:UWAiswzP5FhFMn3F5zrv1v1kz7

Malware Config

Extracted

Family

predatorstealer

C2

http://hojokk.com/0x/

Targets

    • Target

      630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe

    • Size

      278KB

    • MD5

      66a3124fe4ed45fae20e2bd4ee33c626

    • SHA1

      fc5ef4caf4d8a51a340f6fd98ac525debcff8f30

    • SHA256

      630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad

    • SHA512

      569bc064f465c32fd11fdd67896106778f13094e20adc739d8824f9e02508701b712bd3cfdab48782421b35acebe16bb5b0e97543db869ecaec5c1b87902b872

    • SSDEEP

      6144:sU0sd0bzy1GOgofaePZ3e5fv+vc6X+olz:XzHGOgovPwcXbl

    • PredatorStealer

      Predator is a modular stealer written in C#.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks