General

  • Target

    55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a

  • Size

    3.0MB

  • Sample

    220310-vtjchscddl

  • MD5

    09fb8646753f7041cb0dc124b3c571cf

  • SHA1

    d41f962c8b308802635a446d1637a1316be54da1

  • SHA256

    55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a

  • SHA512

    7e0bc327c63acfc77c4276b6e7cffdd6514a4512fe76ebed360c629d94511f20dd0368c6220a21c40e1bb64b53e9a86ccb971a4c38c5cdf813a431716b15a536

Score
9/10

Malware Config

Targets

    • Target

      55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a

    • Size

      3.0MB

    • MD5

      09fb8646753f7041cb0dc124b3c571cf

    • SHA1

      d41f962c8b308802635a446d1637a1316be54da1

    • SHA256

      55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a

    • SHA512

      7e0bc327c63acfc77c4276b6e7cffdd6514a4512fe76ebed360c629d94511f20dd0368c6220a21c40e1bb64b53e9a86ccb971a4c38c5cdf813a431716b15a536

    Score
    9/10
    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks