General

  • Target

    Attached DHL.exe

  • Size

    354KB

  • Sample

    200713-1nftdmevxs

  • MD5

    417c52dec5ca2c6385c20f4d44af7115

  • SHA1

    3af4fbf7324ea4d34ea5c1dc8409002dc3e6cce8

  • SHA256

    6e2fd15a9c77550b18d299a364b3de14f594505d3fe366957635e2ff984c96e7

  • SHA512

    5aa4229601a63e5693808e5017fe3e9fc5a96f561eed9d52c777174c8f7ed7d1557a2a8792b2c50627b9977df7df31fb66097985734a016943b934ff77267e27

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.misrnour.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Em12!@34#$29

Targets

    • Target

      Attached DHL.exe

    • Size

      354KB

    • MD5

      417c52dec5ca2c6385c20f4d44af7115

    • SHA1

      3af4fbf7324ea4d34ea5c1dc8409002dc3e6cce8

    • SHA256

      6e2fd15a9c77550b18d299a364b3de14f594505d3fe366957635e2ff984c96e7

    • SHA512

      5aa4229601a63e5693808e5017fe3e9fc5a96f561eed9d52c777174c8f7ed7d1557a2a8792b2c50627b9977df7df31fb66097985734a016943b934ff77267e27

    Score
    10/10
    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks