General

  • Target

    9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f

  • Size

    666KB

  • Sample

    220228-dvmynaeeam

  • MD5

    7910a78498cb7953b1c0db2ef4f8db27

  • SHA1

    8f61608330261c1d5214f5d19f98b4d64f51ac12

  • SHA256

    9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f

  • SHA512

    fd60d2c922c58906065816d347faf484a7ebfde81e354ca387dffbaf40f07c2ffae7884b702cf709b2f91468848ac132ba3310ec1f081cf1c363c8dea9bc4b7e

Malware Config

Targets

    • Target

      9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f

    • Size

      666KB

    • MD5

      7910a78498cb7953b1c0db2ef4f8db27

    • SHA1

      8f61608330261c1d5214f5d19f98b4d64f51ac12

    • SHA256

      9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f

    • SHA512

      fd60d2c922c58906065816d347faf484a7ebfde81e354ca387dffbaf40f07c2ffae7884b702cf709b2f91468848ac132ba3310ec1f081cf1c363c8dea9bc4b7e

    • OutSteel

      OutSteel is a file uploader and document stealer written in AutoIT.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.