General

  • Target

    92ce1d7b9b41508b2a0d62c1b1543d192d466266ffffc5b8fd6a551c3493f755

  • Size

    492KB

  • Sample

    201106-m97xghn9ge

  • MD5

    d8c3f1b00657238a8eb8358724833266

  • SHA1

    bd8ce2645f427bfcc86f18874c0e98f00f4a6556

  • SHA256

    92ce1d7b9b41508b2a0d62c1b1543d192d466266ffffc5b8fd6a551c3493f755

  • SHA512

    bf01a9377e48aa8bff12672388f68f32e4c9a65aecb930c71885e92c6fb2de8329d4a1a7525bfeb127e0a6ce81a924a170574a55de5ccc00cd1c4d202ca30dde

Malware Config

Targets

    • Target

      92ce1d7b9b41508b2a0d62c1b1543d192d466266ffffc5b8fd6a551c3493f755

    • Size

      492KB

    • MD5

      d8c3f1b00657238a8eb8358724833266

    • SHA1

      bd8ce2645f427bfcc86f18874c0e98f00f4a6556

    • SHA256

      92ce1d7b9b41508b2a0d62c1b1543d192d466266ffffc5b8fd6a551c3493f755

    • SHA512

      bf01a9377e48aa8bff12672388f68f32e4c9a65aecb930c71885e92c6fb2de8329d4a1a7525bfeb127e0a6ce81a924a170574a55de5ccc00cd1c4d202ca30dde

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks