General

  • Target

    464424544266244342.exe

  • Size

    899KB

  • Sample

    210906-hhmvcadgbp

  • MD5

    0911a58481531db75673b46587dbe4c9

  • SHA1

    ab49bd40920e1b24b3c948cd9cd89c328d5edce7

  • SHA256

    d166df0fa1b80518c97b3977154bb8ebfc5364daec8f82b76882d43ec74b2c29

  • SHA512

    08ed905dc6c3fb11263aab1dc82b0f0847f4c2bc9b75c507c250563ea153a0a0c88f0bb21a14cdaf55939997faa461cb71b557bb2eb713ce45b9acb67e116e47

Malware Config

Targets

    • Target

      464424544266244342.exe

    • Size

      899KB

    • MD5

      0911a58481531db75673b46587dbe4c9

    • SHA1

      ab49bd40920e1b24b3c948cd9cd89c328d5edce7

    • SHA256

      d166df0fa1b80518c97b3977154bb8ebfc5364daec8f82b76882d43ec74b2c29

    • SHA512

      08ed905dc6c3fb11263aab1dc82b0f0847f4c2bc9b75c507c250563ea153a0a0c88f0bb21a14cdaf55939997faa461cb71b557bb2eb713ce45b9acb67e116e47

    • A310logger

      A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • A310logger Executable

    • Executes dropped EXE

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks