General

  • Target

    7f8a5f0c96b850acb1f6e5a56ca19188

  • Size

    427KB

  • Sample

    201117-9dnfh68mdx

  • MD5

    372ddd810cea9782ecd2807ad1e54fa2

  • SHA1

    7c3cc00cd71ad3e8dc3ed330448576d34efc336e

  • SHA256

    fa06675d892b6951126471d5087f8f20666824a7df2243a96f6231a443fae75d

  • SHA512

    12e479d1c073d66462626b969c693902c76ad31d7c81d027b35fd0d473918c1883025c80672c546ca1f23411a8d11664d3cf008e02c62c8362fd7c9ddda8e50e

Malware Config

Targets

    • Target

      7f8a5f0c96b850acb1f6e5a56ca19188

    • Size

      427KB

    • MD5

      372ddd810cea9782ecd2807ad1e54fa2

    • SHA1

      7c3cc00cd71ad3e8dc3ed330448576d34efc336e

    • SHA256

      fa06675d892b6951126471d5087f8f20666824a7df2243a96f6231a443fae75d

    • SHA512

      12e479d1c073d66462626b969c693902c76ad31d7c81d027b35fd0d473918c1883025c80672c546ca1f23411a8d11664d3cf008e02c62c8362fd7c9ddda8e50e

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks