General

  • Target

    1beab04f6ca5f34a6c0f6515b24ce4eaa0d354f81887094a1c8ff4a4c6ddf17c

  • Size

    708KB

  • Sample

    201106-fdfxad1kts

  • MD5

    f139bcd08ad8da406f7dd25411d1c9b3

  • SHA1

    2987c25602af9f636511d90dde0ecb637fc1c5e6

  • SHA256

    1beab04f6ca5f34a6c0f6515b24ce4eaa0d354f81887094a1c8ff4a4c6ddf17c

  • SHA512

    cbf2f9d40919648ba395e79320feb13eca3a61fe28da570f64f562dbd959fd87c90459458239a36bff9b913ddc1c0f1ea7f32627b6aae19448b85173c3d088f6

Malware Config

Targets

    • Target

      1beab04f6ca5f34a6c0f6515b24ce4eaa0d354f81887094a1c8ff4a4c6ddf17c

    • Size

      708KB

    • MD5

      f139bcd08ad8da406f7dd25411d1c9b3

    • SHA1

      2987c25602af9f636511d90dde0ecb637fc1c5e6

    • SHA256

      1beab04f6ca5f34a6c0f6515b24ce4eaa0d354f81887094a1c8ff4a4c6ddf17c

    • SHA512

      cbf2f9d40919648ba395e79320feb13eca3a61fe28da570f64f562dbd959fd87c90459458239a36bff9b913ddc1c0f1ea7f32627b6aae19448b85173c3d088f6

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks