General

  • Target

    9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f

  • Size

    666KB

  • Sample

    220228-dvmynaeeam

  • MD5

    7910a78498cb7953b1c0db2ef4f8db27

  • SHA1

    8f61608330261c1d5214f5d19f98b4d64f51ac12

  • SHA256

    9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f

  • SHA512

    fd60d2c922c58906065816d347faf484a7ebfde81e354ca387dffbaf40f07c2ffae7884b702cf709b2f91468848ac132ba3310ec1f081cf1c363c8dea9bc4b7e

Malware Config

Targets

    • Target

      9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f

    • Size

      666KB

    • MD5

      7910a78498cb7953b1c0db2ef4f8db27

    • SHA1

      8f61608330261c1d5214f5d19f98b4d64f51ac12

    • SHA256

      9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f

    • SHA512

      fd60d2c922c58906065816d347faf484a7ebfde81e354ca387dffbaf40f07c2ffae7884b702cf709b2f91468848ac132ba3310ec1f081cf1c363c8dea9bc4b7e

    • OutSteel

      OutSteel is a file uploader and document stealer written in AutoIT.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks