General

  • Target

    47d0e767fbb39105786734ce9b9ad43478d16884244e8ea4b6be67d716b93891.bin.sample.gz

  • Size

    151KB

  • Sample

    201205-dmtm7hfd22

  • MD5

    eac8d20c96896c20d3dfbd2bc813280a

  • SHA1

    1934f133c466efc657731f713a74539cea1872e3

  • SHA256

    f2ed8bc93d2bfccdf72115a353eab24fdb65421e96161245ee488cd4b8b84b29

  • SHA512

    aedf710a2241b48a3d1f229812e50109a877457bf77386715efd040019db7ea2d262df2bffb0d0dc8babf126c9bb2a2e9da88ca8efd019bc5215d725126df230

Score
7/10

Malware Config

Targets

    • Target

      sample

    • Size

      151KB

    • MD5

      678164b918832db3dbf71232ff6cd269

    • SHA1

      733ad1e2269dd7b45f50ef7f5af61d19ea2a0c06

    • SHA256

      47d0e767fbb39105786734ce9b9ad43478d16884244e8ea4b6be67d716b93891

    • SHA512

      70f7223669ece572aae2e6cc7afc8e2aaaa0b3e795fdccdfff81aac28824b18be6a1a51d5f188256fb69ec0f23555a914c368c30339df0521d637f7614da47c3

    Score
    7/10
    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks