General

  • Target

    RFQ Request For Quotation.doc. .exe

  • Size

    1.0MB

  • Sample

    200709-wka4avlsbe

  • MD5

    087a1ecc3d720b786d8cc8544bc469ed

  • SHA1

    721623d6904a1c9e8168c3f104840490b5b52491

  • SHA256

    dff0bf7c85f01cf94f21c7bdd224fe0b3d73dcad9cb38fa40eef4685c9bc63ab

  • SHA512

    ae12605396dc568f7da9d9fdfb5518bcedea190c0c7f3d39d9773c76fee41bc5f0daf966ca31bba6acccdc5be867e64a30c6c1deed2425713db1226c196d5981

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftps4.us.freehostia.com
  • Port:
    21
  • Username:
    jumshi
  • Password:
    winniebobo

Targets

    • Target

      RFQ Request For Quotation.doc. .exe

    • Size

      1.0MB

    • MD5

      087a1ecc3d720b786d8cc8544bc469ed

    • SHA1

      721623d6904a1c9e8168c3f104840490b5b52491

    • SHA256

      dff0bf7c85f01cf94f21c7bdd224fe0b3d73dcad9cb38fa40eef4685c9bc63ab

    • SHA512

      ae12605396dc568f7da9d9fdfb5518bcedea190c0c7f3d39d9773c76fee41bc5f0daf966ca31bba6acccdc5be867e64a30c6c1deed2425713db1226c196d5981

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Modifies service

MITRE ATT&CK Enterprise v6

Tasks