General

  • Target

    ad7df9c3f3da564ae38fda8bfa0324a52ed98899696e763dae3bff7dad93262b.bin

  • Size

    259KB

  • Sample

    201103-tr6xyakgjs

  • MD5

    90f4fab60b172036e83986cfa0a4d33c

  • SHA1

    c4a1d53fc980a5b74abfb393810e0c42ee6be395

  • SHA256

    ad7df9c3f3da564ae38fda8bfa0324a52ed98899696e763dae3bff7dad93262b

  • SHA512

    e0f9e4f6d9aad1bb85681083f49aa698176cafd41449efc5194df88f614b387a543c33d5144892fd18aff6548f4b3f4909dc447b2bf68efefbcda1c9966d358b

Score
7/10

Malware Config

Targets

    • Target

      ad7df9c3f3da564ae38fda8bfa0324a52ed98899696e763dae3bff7dad93262b.bin

    • Size

      259KB

    • MD5

      90f4fab60b172036e83986cfa0a4d33c

    • SHA1

      c4a1d53fc980a5b74abfb393810e0c42ee6be395

    • SHA256

      ad7df9c3f3da564ae38fda8bfa0324a52ed98899696e763dae3bff7dad93262b

    • SHA512

      e0f9e4f6d9aad1bb85681083f49aa698176cafd41449efc5194df88f614b387a543c33d5144892fd18aff6548f4b3f4909dc447b2bf68efefbcda1c9966d358b

    Score
    7/10
    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks