General

  • Target

    3f7b0d15f4cbe63e57fb06b57575bf6dd9eb777c737b0886250166768169fc6c

  • Size

    598KB

  • Sample

    220228-dprpnaeden

  • MD5

    45abce50a00d40dff21edb7264824758

  • SHA1

    0861d2abbcf16bf6394dc7aadd341b348a3c8c4d

  • SHA256

    3f7b0d15f4cbe63e57fb06b57575bf6dd9eb777c737b0886250166768169fc6c

  • SHA512

    7097f34634f716609bc4bbe27af511a9fec24c555c25c22e712f3ce019b471328226030bb2939692f36a81cc24de105670b263d0fb7036375e60c8ddaee2a8f6

Malware Config

Targets

    • Target

      3f7b0d15f4cbe63e57fb06b57575bf6dd9eb777c737b0886250166768169fc6c

    • Size

      598KB

    • MD5

      45abce50a00d40dff21edb7264824758

    • SHA1

      0861d2abbcf16bf6394dc7aadd341b348a3c8c4d

    • SHA256

      3f7b0d15f4cbe63e57fb06b57575bf6dd9eb777c737b0886250166768169fc6c

    • SHA512

      7097f34634f716609bc4bbe27af511a9fec24c555c25c22e712f3ce019b471328226030bb2939692f36a81cc24de105670b263d0fb7036375e60c8ddaee2a8f6

    • OutSteel

      OutSteel is a file uploader and document stealer written in AutoIT.

    • OutSteel batch script

      Detects batch script dropped by OutSteel

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v6

Tasks