General

  • Target

    ea44d48c76296c8ab490e6408b1d0726.exe

  • Size

    619KB

  • Sample

    200709-rb2ykdfv36

  • MD5

    ea44d48c76296c8ab490e6408b1d0726

  • SHA1

    b3809f6a46816a63bf31136493d312d09f775b36

  • SHA256

    70ccb52e4c78d8b68d562fb7088d143577ad35a4b0bd01581a383c41580f1b2d

  • SHA512

    33a249cb32e51f4f6246f1890ae9fcc90c6093a7e58999bff7c04ae7ceb3b19bcf42db3fbab1527594be560d9074602d2807d9b1837d41ca7aa2f7410922a3a2

Score
10/10

Malware Config

Targets

    • Target

      ea44d48c76296c8ab490e6408b1d0726.exe

    • Size

      619KB

    • MD5

      ea44d48c76296c8ab490e6408b1d0726

    • SHA1

      b3809f6a46816a63bf31136493d312d09f775b36

    • SHA256

      70ccb52e4c78d8b68d562fb7088d143577ad35a4b0bd01581a383c41580f1b2d

    • SHA512

      33a249cb32e51f4f6246f1890ae9fcc90c6093a7e58999bff7c04ae7ceb3b19bcf42db3fbab1527594be560d9074602d2807d9b1837d41ca7aa2f7410922a3a2

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for installed software on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks