General

  • Target

    b5ba0d771f5ff6ce1b85a8dec7a7c9f3.exe

  • Size

    533KB

  • Sample

    210222-qntj5k1mcs

  • MD5

    b5ba0d771f5ff6ce1b85a8dec7a7c9f3

  • SHA1

    616078b7936e8ee4fe431ef06973ab22be91b67b

  • SHA256

    989f403c14fe2ab86cb51cb4232ed7a3fc8f623ad8025e674acfa3bf45a0d917

  • SHA512

    36df32ebdea5e70a7e55417edff8570afc789c3f6e3a50f80169f2639be6f75818b0b6be47364fe31f37f50b8262ddad9449f14e01a2c018ed3847bd0a45d3d2

Score
8/10

Malware Config

Targets

    • Target

      b5ba0d771f5ff6ce1b85a8dec7a7c9f3.exe

    • Size

      533KB

    • MD5

      b5ba0d771f5ff6ce1b85a8dec7a7c9f3

    • SHA1

      616078b7936e8ee4fe431ef06973ab22be91b67b

    • SHA256

      989f403c14fe2ab86cb51cb4232ed7a3fc8f623ad8025e674acfa3bf45a0d917

    • SHA512

      36df32ebdea5e70a7e55417edff8570afc789c3f6e3a50f80169f2639be6f75818b0b6be47364fe31f37f50b8262ddad9449f14e01a2c018ed3847bd0a45d3d2

    Score
    8/10
    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks