General

  • Target

    597acd81a019562b8d09ee23bcf2085945de7b1de682a0cc34462c841aeee812

  • Size

    5.0MB

  • Sample

    220418-n6345ahgf4

  • MD5

    54f5610b3760ac02b7c9436a78a49824

  • SHA1

    86681e1c086d07aa84f7b68a879704c28105ebf7

  • SHA256

    597acd81a019562b8d09ee23bcf2085945de7b1de682a0cc34462c841aeee812

  • SHA512

    7fc07e7914cc7fb2708bea471a6f970cad3118287684c788a809d7483a0957fc8f1c38c3d56db5bda3f179b2d34f3f154f663b33b87556c918bb91d90f46b103

Malware Config

Targets

    • Target

      597acd81a019562b8d09ee23bcf2085945de7b1de682a0cc34462c841aeee812

    • Size

      5.0MB

    • MD5

      54f5610b3760ac02b7c9436a78a49824

    • SHA1

      86681e1c086d07aa84f7b68a879704c28105ebf7

    • SHA256

      597acd81a019562b8d09ee23bcf2085945de7b1de682a0cc34462c841aeee812

    • SHA512

      7fc07e7914cc7fb2708bea471a6f970cad3118287684c788a809d7483a0957fc8f1c38c3d56db5bda3f179b2d34f3f154f663b33b87556c918bb91d90f46b103

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks