Resubmissions

17-01-2021 19:03

210117-vthn71bhpx 8

15-01-2021 15:37

210115-vcgsk2m7fa 10

General

  • Target

    a22e658934911479aa3e867fbd6d07b6.exe

  • Size

    505KB

  • Sample

    210117-vthn71bhpx

  • MD5

    a22e658934911479aa3e867fbd6d07b6

  • SHA1

    620d97ef5a4122a47ce90bf1f3493bf818ccd7dd

  • SHA256

    f0cd7710ff81d06494b7130e510dbdd80503aa290be1cc845f465c068301747c

  • SHA512

    ce359d4e0f82836396859e05d7285495a4a6512a9d0c8b773936295f41a5d9d7f79ed6eb55ef90ae3d003a8afd51624382a7fce0ac8fd4e76e7a33eb6f3ae88e

Malware Config

Targets

    • Target

      a22e658934911479aa3e867fbd6d07b6.exe

    • Size

      505KB

    • MD5

      a22e658934911479aa3e867fbd6d07b6

    • SHA1

      620d97ef5a4122a47ce90bf1f3493bf818ccd7dd

    • SHA256

      f0cd7710ff81d06494b7130e510dbdd80503aa290be1cc845f465c068301747c

    • SHA512

      ce359d4e0f82836396859e05d7285495a4a6512a9d0c8b773936295f41a5d9d7f79ed6eb55ef90ae3d003a8afd51624382a7fce0ac8fd4e76e7a33eb6f3ae88e

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks