General

  • Target

    3c088b2ac5fce8576045021dce5333c7b8decdc56c0e9c3c4e172fe3be64b93d

  • Size

    432KB

  • Sample

    220311-a6evmsggen

  • MD5

    ec13885ac1fa50ece707d7da429946b4

  • SHA1

    d4b35ca86bb26f51c3db49f27d539e2ea898285b

  • SHA256

    3c088b2ac5fce8576045021dce5333c7b8decdc56c0e9c3c4e172fe3be64b93d

  • SHA512

    d290ffd02d5b691120f2b805ec874b335f345e3305cccbf2d269ed99364556cdf30c70b8ecbc87b96672c586b20d718f0573b3a4e4165acafd1ef88d07bc755f

Malware Config

Targets

    • Target

      3c088b2ac5fce8576045021dce5333c7b8decdc56c0e9c3c4e172fe3be64b93d

    • Size

      432KB

    • MD5

      ec13885ac1fa50ece707d7da429946b4

    • SHA1

      d4b35ca86bb26f51c3db49f27d539e2ea898285b

    • SHA256

      3c088b2ac5fce8576045021dce5333c7b8decdc56c0e9c3c4e172fe3be64b93d

    • SHA512

      d290ffd02d5b691120f2b805ec874b335f345e3305cccbf2d269ed99364556cdf30c70b8ecbc87b96672c586b20d718f0573b3a4e4165acafd1ef88d07bc755f

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks