General

  • Target

    0d03686a340b35af296ad06c3cf4747576b7980a0c33f4e22c6dc514bb125cb5

  • Size

    6.2MB

  • Sample

    220415-l5mdwabgf7

  • MD5

    1a599b0cf3bed3a67c11c0eecbc1ed25

  • SHA1

    ae0e2838d6b98dcf4b1d56befef1241789c64329

  • SHA256

    0d03686a340b35af296ad06c3cf4747576b7980a0c33f4e22c6dc514bb125cb5

  • SHA512

    1035d6c15c7dabe88f87558050f3ea99d9fcad60d8031e85013bfc5e4e539ad0376b25f404ecb177b2cc3dc48e9aab5fc5e03beeffce1f243210dd254ed4dcca

Malware Config

Targets

    • Target

      0d03686a340b35af296ad06c3cf4747576b7980a0c33f4e22c6dc514bb125cb5

    • Size

      6.2MB

    • MD5

      1a599b0cf3bed3a67c11c0eecbc1ed25

    • SHA1

      ae0e2838d6b98dcf4b1d56befef1241789c64329

    • SHA256

      0d03686a340b35af296ad06c3cf4747576b7980a0c33f4e22c6dc514bb125cb5

    • SHA512

      1035d6c15c7dabe88f87558050f3ea99d9fcad60d8031e85013bfc5e4e539ad0376b25f404ecb177b2cc3dc48e9aab5fc5e03beeffce1f243210dd254ed4dcca

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks