General

  • Target

    bghKnCQqX.exe

  • Size

    536KB

  • Sample

    240211-kqkq3aed6y

  • MD5

    862ab6b0e8dffbc12eeda9a35e87d7a3

  • SHA1

    e4b43bf4074ad794ca1c2fe3da1a074a78fa6d0c

  • SHA256

    484eb8232a4ec3d75edc1de58a87deac07367d7c51bc64152f746698a73915cd

  • SHA512

    61b5fd38349638245ddd71143b3771ff3bc74764b3a5c7d85c6da01366c20f9f1584188529af7cae414c718453671d2042ff30165b1ebfdc41d60ed67a2d0ee7

  • SSDEEP

    6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJU6:OPw2PjCLe3a6Q70zbYow606

Malware Config

Extracted

Family

predatorstealer

C2

http://53d5-66-154-102-195.ngrok-free.app/3g86/panel/panel/panel/Panel/

Targets

    • Target

      bghKnCQqX.exe

    • Size

      536KB

    • MD5

      862ab6b0e8dffbc12eeda9a35e87d7a3

    • SHA1

      e4b43bf4074ad794ca1c2fe3da1a074a78fa6d0c

    • SHA256

      484eb8232a4ec3d75edc1de58a87deac07367d7c51bc64152f746698a73915cd

    • SHA512

      61b5fd38349638245ddd71143b3771ff3bc74764b3a5c7d85c6da01366c20f9f1584188529af7cae414c718453671d2042ff30165b1ebfdc41d60ed67a2d0ee7

    • SSDEEP

      6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJU6:OPw2PjCLe3a6Q70zbYow606

    • PredatorStealer

      Predator is a modular stealer written in C#.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

4
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks