General

  • Target

    tot.exe

  • Size

    921KB

  • Sample

    201204-xdgysebzvx

  • MD5

    460818c22adbaf5fdac55b38f153e169

  • SHA1

    8ba1bd0b05dbf04a4ff629755eb9a2b73d6db381

  • SHA256

    a72ee397635337a52d81d5a1d5bea4c48a375af13dc2848737f21c0577ab17b5

  • SHA512

    8e77663bb706c1062ea91e462815b23c082a89c8ddc105e5399febac822e0d9afb70cd363a15042f025404396e518d5c11d638c0a4ab31e9fbd22e8656965ed6

Score
7/10

Malware Config

Targets

    • Target

      tot.exe

    • Size

      921KB

    • MD5

      460818c22adbaf5fdac55b38f153e169

    • SHA1

      8ba1bd0b05dbf04a4ff629755eb9a2b73d6db381

    • SHA256

      a72ee397635337a52d81d5a1d5bea4c48a375af13dc2848737f21c0577ab17b5

    • SHA512

      8e77663bb706c1062ea91e462815b23c082a89c8ddc105e5399febac822e0d9afb70cd363a15042f025404396e518d5c11d638c0a4ab31e9fbd22e8656965ed6

    Score
    7/10
    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks