General

  • Target

    0321c721b3119137078328751795cf4f12398fff89bfeb7f0e27a6379bd00a6c

  • Size

    5.3MB

  • Sample

    220511-3ahkwafchj

  • MD5

    ce983ab5f22d65b65107a7f3e7d6ea13

  • SHA1

    49d52a9d319c0bb358f67e197eec27cf738070eb

  • SHA256

    0321c721b3119137078328751795cf4f12398fff89bfeb7f0e27a6379bd00a6c

  • SHA512

    e2f91c60dcc1ad83846cf9b1aad802db17046734753ce7cf6cca46d6c09a4e28895611257be73593372a76914da34ca08a1bbf997559fa87ac16b322494c8d2e

Malware Config

Targets

    • Target

      0321c721b3119137078328751795cf4f12398fff89bfeb7f0e27a6379bd00a6c

    • Size

      5.3MB

    • MD5

      ce983ab5f22d65b65107a7f3e7d6ea13

    • SHA1

      49d52a9d319c0bb358f67e197eec27cf738070eb

    • SHA256

      0321c721b3119137078328751795cf4f12398fff89bfeb7f0e27a6379bd00a6c

    • SHA512

      e2f91c60dcc1ad83846cf9b1aad802db17046734753ce7cf6cca46d6c09a4e28895611257be73593372a76914da34ca08a1bbf997559fa87ac16b322494c8d2e

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks