General

  • Target

    bd87c967a1b2c8a5ac8a9470e606ba0494fa2a4f7633ee19bb6858825282aa85

  • Size

    5.0MB

  • Sample

    220417-kxr4qagae3

  • MD5

    7667aea81040c555c120d8fbd57e153a

  • SHA1

    9896aa8348f271ac9f6f2433f7e27ed14617e37c

  • SHA256

    bd87c967a1b2c8a5ac8a9470e606ba0494fa2a4f7633ee19bb6858825282aa85

  • SHA512

    b09510481873ea51003b9a67e77805f23b549a43ef8521989ae5fbea1e4a3756251e37878660b041178dc3fdd6badcb811e3ccd3ce7a026e1cd9de26e1786295

Malware Config

Targets

    • Target

      bd87c967a1b2c8a5ac8a9470e606ba0494fa2a4f7633ee19bb6858825282aa85

    • Size

      5.0MB

    • MD5

      7667aea81040c555c120d8fbd57e153a

    • SHA1

      9896aa8348f271ac9f6f2433f7e27ed14617e37c

    • SHA256

      bd87c967a1b2c8a5ac8a9470e606ba0494fa2a4f7633ee19bb6858825282aa85

    • SHA512

      b09510481873ea51003b9a67e77805f23b549a43ef8521989ae5fbea1e4a3756251e37878660b041178dc3fdd6badcb811e3ccd3ce7a026e1cd9de26e1786295

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks