General

  • Target

    c346d3a0a6b975f4d663c2640bd6bd8fe0f0028b31420b68b5a585fec69eafc9.zip

  • Size

    320KB

  • Sample

    210227-w4hf57lcw2

  • MD5

    324cc9010fbd8fb308dbdeb829d94cb4

  • SHA1

    58bf9af897223812482fcfab3ec64a101452577c

  • SHA256

    fede0144a94bc799bfbc687dccd5320cb5b38b619ca23eff7034acbd37fab462

  • SHA512

    ae264993ad9de671ca53f1c8d283a9d4c6b47b3391b75d7fb0997287a8502ff7d744e6fdb9d669c7565d521b4eaba7045d22c04c51c7b2e533112c3c5f037a7f

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.maccinox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    peru2016

Targets

    • Target

      c346d3a0a6b975f4d663c2640bd6bd8fe0f0028b31420b68b5a585fec69eafc9.exe

    • Size

      505KB

    • MD5

      ebb6953b42064816c172bf1384bff891

    • SHA1

      83874ac89ffc018f26f7f0b4ec8dcbb67803b5ad

    • SHA256

      c346d3a0a6b975f4d663c2640bd6bd8fe0f0028b31420b68b5a585fec69eafc9

    • SHA512

      43a2d0ef1f434aea5d7da25fd6ed35d1a23e4ad2696b924f96a30237e21923832576d85877e1cad01fda796946dd021699ad5cf4aa415c30ba0dcfa8c75d1d1f

    • 404 Keylogger

      Information stealer and keylogger first seen in 2019.

    • 404 Keylogger Main Executable

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks