General

  • Target

    Specifications_Details_20330_FLQ.exe

  • Size

    799KB

  • Sample

    210721-bhssq63gns

  • MD5

    edbb2066fd9539e279bf48077b755a40

  • SHA1

    f914783d5d5aeeb95eda30a8c456624e471108a2

  • SHA256

    41f206a7e8b3c15642e6cfad479ae3f0972b82e57ec46a5ffd31e51954a81c6c

  • SHA512

    8c9fa977b79afbbe9a49f0bb3ee93479f4bb4b44211fac8c87beae2e8ca917c0c3be783ce6a0d1e268bf92b2ddd893454a86d13c95a732896206429e5cc98862

Malware Config

Targets

    • Target

      Specifications_Details_20330_FLQ.exe

    • Size

      799KB

    • MD5

      edbb2066fd9539e279bf48077b755a40

    • SHA1

      f914783d5d5aeeb95eda30a8c456624e471108a2

    • SHA256

      41f206a7e8b3c15642e6cfad479ae3f0972b82e57ec46a5ffd31e51954a81c6c

    • SHA512

      8c9fa977b79afbbe9a49f0bb3ee93479f4bb4b44211fac8c87beae2e8ca917c0c3be783ce6a0d1e268bf92b2ddd893454a86d13c95a732896206429e5cc98862

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks