General

  • Target

    Comprobante de pago (OCT).xls

  • Size

    122KB

  • Sample

    211021-w8xdcsbefl

  • MD5

    643cc6f7df3ef634150217b269afbd8a

  • SHA1

    b66df95d3bb7f48f4d429638ba68219f74f7b079

  • SHA256

    ecc323c737ea71e81873751995b2c6c5d0bc8845db73466d0d1cdc518c57041b

  • SHA512

    92ac4407b3eb7f8f42d6976f84b354a499463e8b643979b6bee541bac99abaf5e523141c514b25830d95ee3cebce0c636c41bae02a8e10d27728f849e28b0946

Malware Config

Targets

    • Target

      Comprobante de pago (OCT).xls

    • Size

      122KB

    • MD5

      643cc6f7df3ef634150217b269afbd8a

    • SHA1

      b66df95d3bb7f48f4d429638ba68219f74f7b079

    • SHA256

      ecc323c737ea71e81873751995b2c6c5d0bc8845db73466d0d1cdc518c57041b

    • SHA512

      92ac4407b3eb7f8f42d6976f84b354a499463e8b643979b6bee541bac99abaf5e523141c514b25830d95ee3cebce0c636c41bae02a8e10d27728f849e28b0946

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks