General

  • Target

    7435af4d6932bb4ed3a26f1cd5ce81654c9b0fd25a9a4a6f7e821678df032168.bin

  • Size

    267KB

  • Sample

    201103-wft287aypa

  • MD5

    380f84c424cab7509becd4d72b848985

  • SHA1

    c6abf35abbcaddadb4148c2632cf9e3bf666232e

  • SHA256

    7435af4d6932bb4ed3a26f1cd5ce81654c9b0fd25a9a4a6f7e821678df032168

  • SHA512

    b7c755c5a5b11a4bca7e6930517660e5b6225f525462912c990308ea74fe2927c09152d4c1c5d64649658aeee92099b64e8908de08f4658071c456c8f811024b

Score
7/10

Malware Config

Targets

    • Target

      7435af4d6932bb4ed3a26f1cd5ce81654c9b0fd25a9a4a6f7e821678df032168.bin

    • Size

      267KB

    • MD5

      380f84c424cab7509becd4d72b848985

    • SHA1

      c6abf35abbcaddadb4148c2632cf9e3bf666232e

    • SHA256

      7435af4d6932bb4ed3a26f1cd5ce81654c9b0fd25a9a4a6f7e821678df032168

    • SHA512

      b7c755c5a5b11a4bca7e6930517660e5b6225f525462912c990308ea74fe2927c09152d4c1c5d64649658aeee92099b64e8908de08f4658071c456c8f811024b

    Score
    7/10
    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks