General

  • Target

    fe5b1689a49297d3045641db2e334b6fe50d5d1eea3de724d8cf14b1c6e45312

  • Size

    260KB

  • Sample

    220307-z5tpvaagbn

  • MD5

    727f933d0d10fb257a7db2fef10eb2f0

  • SHA1

    e10043ffd3723c0d9c46c122c543de5810bfb74e

  • SHA256

    fe5b1689a49297d3045641db2e334b6fe50d5d1eea3de724d8cf14b1c6e45312

  • SHA512

    dfc27571f6e2feb0a66e2f1b9967f98f605be8299b742a827192dfb0794f7aa29a29a403029e342167a84fc5902e0080933b67471ca08831e414bf44781101ed

Malware Config

Targets

    • Target

      fe5b1689a49297d3045641db2e334b6fe50d5d1eea3de724d8cf14b1c6e45312

    • Size

      260KB

    • MD5

      727f933d0d10fb257a7db2fef10eb2f0

    • SHA1

      e10043ffd3723c0d9c46c122c543de5810bfb74e

    • SHA256

      fe5b1689a49297d3045641db2e334b6fe50d5d1eea3de724d8cf14b1c6e45312

    • SHA512

      dfc27571f6e2feb0a66e2f1b9967f98f605be8299b742a827192dfb0794f7aa29a29a403029e342167a84fc5902e0080933b67471ca08831e414bf44781101ed

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks