General

  • Target

    26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28

  • Size

    598KB

  • Sample

    201109-c1lars8r36

  • MD5

    cb0a06a7bf5a2017f1a58fcd576d117d

  • SHA1

    c30ad86b1196cd4307f3b3cfa4b638d236a03b02

  • SHA256

    26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28

  • SHA512

    3132cfe92836d5eb77f005e04939acf83626f28a3f2cce4835c2c7093cc7c970aa91f686e8e650dcec704f8bc55cd5309a03d4032ce443e246773b61ba77130f

Malware Config

Targets

    • Target

      26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28

    • Size

      598KB

    • MD5

      cb0a06a7bf5a2017f1a58fcd576d117d

    • SHA1

      c30ad86b1196cd4307f3b3cfa4b638d236a03b02

    • SHA256

      26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28

    • SHA512

      3132cfe92836d5eb77f005e04939acf83626f28a3f2cce4835c2c7093cc7c970aa91f686e8e650dcec704f8bc55cd5309a03d4032ce443e246773b61ba77130f

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks