General

  • Target

    5678254924136448.zip

  • Size

    16.6MB

  • Sample

    211201-msjynaeee4

  • MD5

    8699cfeba2e2d4af743f47cc1ae6794e

  • SHA1

    8bfa81e21676dce73196c8ab96bcda1811da373c

  • SHA256

    91d59bd1cb4e4837c9d505c8a289ac147df7558d8602ba3a754ad9b7e45f6357

  • SHA512

    7f21762cd1ba2ed1c1e6e2d8936f3196bf43145e1be33ee13a60d228b0c7171e4d8fe9fc7aa5b70bc86edd6e3e5e8e0e4f752f1fca2dc7ddc6dd4335ca0472e8

Malware Config

Targets

    • Target

      8b314389db05b558dd18b17ff52b225abbf40d99513ca78042f4af9d39831941

    • Size

      16.9MB

    • MD5

      79dfcb8d33da660c748ff5f3685e7754

    • SHA1

      1ddfef1a7fc60ca52b559cda7527ecb352613985

    • SHA256

      8b314389db05b558dd18b17ff52b225abbf40d99513ca78042f4af9d39831941

    • SHA512

      d42b399c3924fff83f599dd7b14818cfcc23ab68516439770d4a6e7a6c4675fb0c8f6a39b589e0dbf67fdac5dbdf9eb6a5e8948a4ca89f155b380b4f8c996f1f

    • Registers COM server for autorun

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks