General

  • Target

    3d7a05e7ba9b3dd84017acab9aab59b459db6c50e9224ec1827cbf0a2aee47db

  • Size

    614KB

  • Sample

    220228-dvv92adac4

  • MD5

    124f0b9dadbef030a4cba26393ce25df

  • SHA1

    15479f31109fd0a367ad681fb3ee63c6fb0ade0a

  • SHA256

    3d7a05e7ba9b3dd84017acab9aab59b459db6c50e9224ec1827cbf0a2aee47db

  • SHA512

    7ef9d49f28d1728a6ef58a9a2d39848dee0f08184b202aeb65460869fed35e6f99466d9bce8cb6582fd4089bc63af95216c1252af1f2a3dd2c24e43546352a74

Malware Config

Targets

    • Target

      3d7a05e7ba9b3dd84017acab9aab59b459db6c50e9224ec1827cbf0a2aee47db

    • Size

      614KB

    • MD5

      124f0b9dadbef030a4cba26393ce25df

    • SHA1

      15479f31109fd0a367ad681fb3ee63c6fb0ade0a

    • SHA256

      3d7a05e7ba9b3dd84017acab9aab59b459db6c50e9224ec1827cbf0a2aee47db

    • SHA512

      7ef9d49f28d1728a6ef58a9a2d39848dee0f08184b202aeb65460869fed35e6f99466d9bce8cb6582fd4089bc63af95216c1252af1f2a3dd2c24e43546352a74

    • OutSteel

      OutSteel is a file uploader and document stealer written in AutoIT.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks