General

  • Target

    745787747877.bin.zip

  • Size

    194KB

  • Sample

    200512-94jhrfhyfj

  • MD5

    6619d58fc454ec1d0deb24641a0b915a

  • SHA1

    11cb9eab9ab214f88fd23f3d8697a6a4dc65e7ca

  • SHA256

    a60891c8a1d77512c14952979fce1cf3713c217d01b07a2725706a0332574774

  • SHA512

    d4950a173a3885019d3d13d1216b8c71cbb73af4021da1bf84536dbe731dd6cdc1e2f37c63c387376a7af6559665c0f9eb726d40ab158b0dd84bde2c104e2ea9

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.ionos.fr
  • Port:
    587
  • Username:
    contact@estfacades.fr
  • Password:
    Kayseri38&

Targets

    • Target

      745787747877.bin

    • Size

      402KB

    • MD5

      fa07ab12e32195ccf094985892d70cf2

    • SHA1

      78ef4a2709ab08aa7c62961991388cacfab3c353

    • SHA256

      a1cb58fb08f1a05994840af272013f82d390dddb0c22260d028c8e20d5320d68

    • SHA512

      8ad30924a9be8b185ae22a78a0a511caa06d6bc753087a4cc7f439bd9190a866adc504815f0aaa5445bd9e998abebc98ad39c2cae1babd95724931e96656e7d1

    Score
    10/10
    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks