General

  • Target

    0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e

  • Size

    5.4MB

  • Sample

    200828-hkf3ryzkl6

  • MD5

    d7d6889bfa96724f7b3f951bc06e8c02

  • SHA1

    a897f6fb6fff70c71b224caea80846bcd264cf1e

  • SHA256

    0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e

  • SHA512

    0aabb090791d8b7c5af273793d61bc7ef164343d027e12b58faec66dbdddb724f58b267a423088ce06c52420af80ffe276b448cd3844fee4f929a98b0f64ae75

Malware Config

Targets

    • Target

      0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e

    • Size

      5.4MB

    • MD5

      d7d6889bfa96724f7b3f951bc06e8c02

    • SHA1

      a897f6fb6fff70c71b224caea80846bcd264cf1e

    • SHA256

      0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e

    • SHA512

      0aabb090791d8b7c5af273793d61bc7ef164343d027e12b58faec66dbdddb724f58b267a423088ce06c52420af80ffe276b448cd3844fee4f929a98b0f64ae75

    • Modifies system executable filetype association

    • ObliqueRAT

      Remote Access Trojan discovered in early 2020.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • JavaScript code in executable

MITRE ATT&CK Enterprise v6

Tasks