General

  • Target

    b8e1b825f528d415cfeef7c52ee52e8aca563275c08a934d9e48f123bf09077d

  • Size

    4.6MB

  • Sample

    220511-c6ntnagfbj

  • MD5

    fa176642f46e370c3addebc76fcbf2f5

  • SHA1

    5a4875ac5cd759a817d3efb0dd0529c9fca25264

  • SHA256

    b8e1b825f528d415cfeef7c52ee52e8aca563275c08a934d9e48f123bf09077d

  • SHA512

    ddeb33c32f661f4557bd5aee8fb1d1f4ea39d1d9fbce4543989ffc4a4ad3df844b270afceac643e488045487c49bc3f685a32c076917aa59254bce94fda40687

Malware Config

Targets

    • Target

      b8e1b825f528d415cfeef7c52ee52e8aca563275c08a934d9e48f123bf09077d

    • Size

      4.6MB

    • MD5

      fa176642f46e370c3addebc76fcbf2f5

    • SHA1

      5a4875ac5cd759a817d3efb0dd0529c9fca25264

    • SHA256

      b8e1b825f528d415cfeef7c52ee52e8aca563275c08a934d9e48f123bf09077d

    • SHA512

      ddeb33c32f661f4557bd5aee8fb1d1f4ea39d1d9fbce4543989ffc4a4ad3df844b270afceac643e488045487c49bc3f685a32c076917aa59254bce94fda40687

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks