General

  • Target

    e038cd85c9da66e9517bba1e3af819a7cb1cf068fe955b8e125273d1e0533c2b

  • Size

    487KB

  • Sample

    211204-d9r6xsabfl

  • MD5

    dab3afd4e25abdc582e6325f31257ee8

  • SHA1

    88648132d7f0b1fe59da88c696016e3b1e496fa5

  • SHA256

    e038cd85c9da66e9517bba1e3af819a7cb1cf068fe955b8e125273d1e0533c2b

  • SHA512

    e75b6166812fa7fb5852438a8ee8b2ad0ac48ced215c1bf8990f662efb63777164a731d899ffa743baf45671f90ef2af18c87ea43c5da57b4092536948b8bfc2

Malware Config

Targets

    • Target

      e038cd85c9da66e9517bba1e3af819a7cb1cf068fe955b8e125273d1e0533c2b

    • Size

      487KB

    • MD5

      dab3afd4e25abdc582e6325f31257ee8

    • SHA1

      88648132d7f0b1fe59da88c696016e3b1e496fa5

    • SHA256

      e038cd85c9da66e9517bba1e3af819a7cb1cf068fe955b8e125273d1e0533c2b

    • SHA512

      e75b6166812fa7fb5852438a8ee8b2ad0ac48ced215c1bf8990f662efb63777164a731d899ffa743baf45671f90ef2af18c87ea43c5da57b4092536948b8bfc2

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks