Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    09-07-2020 12:03

General

  • Target

    8dbaeb95613404b722cddba9f846af5d.exe

  • Size

    292KB

  • MD5

    8dbaeb95613404b722cddba9f846af5d

  • SHA1

    a8eb6c8e3f83621e6237eb637d7ff4f47be1e9fb

  • SHA256

    92eadd8fcf1d04978390cd854817d52bcbdf54ea60bd1dd3c24d8ab2bad843d1

  • SHA512

    a3a7bf361889c8e1ae4c1b7e0e9211cb619764331580341564bca53a4bc46a88016f55fa19c9b078aa4e92a65635dd88b2cf9c94bed334ec6c57d08fcfccb741

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    $%$nWr+eH

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dbaeb95613404b722cddba9f846af5d.exe
    "C:\Users\Admin\AppData\Local\Temp\8dbaeb95613404b722cddba9f846af5d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:428

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads