General

  • Target

    b8ce958f56087c6cd55fa2131a1cd3256063e7c73adf36af313054b0f17b7b43

  • Size

    634KB

  • Sample

    220228-dv2f2sdac6

  • MD5

    d4fa9c88bd43d2b9bcb66c3e7292b52a

  • SHA1

    5cf627b7cc836506958a5e04e902f8530cdb58b6

  • SHA256

    b8ce958f56087c6cd55fa2131a1cd3256063e7c73adf36af313054b0f17b7b43

  • SHA512

    2088445e2dd2e9497c97acb7ad426536c2d190014702fd4c77193193db42cedbb9dcae918e37ce4161393a4043f36e76ff2947e0276fe4647b38478725d03919

Malware Config

Targets

    • Target

      b8ce958f56087c6cd55fa2131a1cd3256063e7c73adf36af313054b0f17b7b43

    • Size

      634KB

    • MD5

      d4fa9c88bd43d2b9bcb66c3e7292b52a

    • SHA1

      5cf627b7cc836506958a5e04e902f8530cdb58b6

    • SHA256

      b8ce958f56087c6cd55fa2131a1cd3256063e7c73adf36af313054b0f17b7b43

    • SHA512

      2088445e2dd2e9497c97acb7ad426536c2d190014702fd4c77193193db42cedbb9dcae918e37ce4161393a4043f36e76ff2947e0276fe4647b38478725d03919

    • OutSteel

      OutSteel is a file uploader and document stealer written in AutoIT.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks