General

  • Target

    c7c0d5c274eadf534eea3203e6c026258144c68e

  • Size

    434KB

  • Sample

    210216-bmx6k4p37n

  • MD5

    0450cf37e2dd4058563f73f6ca7940e5

  • SHA1

    c7c0d5c274eadf534eea3203e6c026258144c68e

  • SHA256

    da767e6faf97d73997f397eae71b372a549dd6331bf8ec0ebd398ef8cfe9a47e

  • SHA512

    2d48fe05f18934808609d121e2dff8596016406002f221d90154903b09b40d409f805aba51ed8801ae572f20e1005fc104d83ead4b05eeab7ea39c8063a06ef3

Malware Config

Targets

    • Target

      c7c0d5c274eadf534eea3203e6c026258144c68e

    • Size

      434KB

    • MD5

      0450cf37e2dd4058563f73f6ca7940e5

    • SHA1

      c7c0d5c274eadf534eea3203e6c026258144c68e

    • SHA256

      da767e6faf97d73997f397eae71b372a549dd6331bf8ec0ebd398ef8cfe9a47e

    • SHA512

      2d48fe05f18934808609d121e2dff8596016406002f221d90154903b09b40d409f805aba51ed8801ae572f20e1005fc104d83ead4b05eeab7ea39c8063a06ef3

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Connection Proxy

1
T1090

Tasks