General

  • Target

    922374366d4bd0ac49bc5b2faa9d5b99277d28ffc50ff6538f44e77b42ab3d42

  • Size

    28.1MB

  • Sample

    220511-c6zadsdhe3

  • MD5

    cc7f8e64aa1a7f136c586cff8ec6e09d

  • SHA1

    8346c9c7e12e421e4effa20e6bbef7ff279adb2e

  • SHA256

    922374366d4bd0ac49bc5b2faa9d5b99277d28ffc50ff6538f44e77b42ab3d42

  • SHA512

    6318708209e0ca579e7254d18f1c33335ebd4da87a222cf343b22174135fd5024265e7bca93a7004dd96d3b047e906f0fe8b8b52425ada6710de4cca48d9f464

Malware Config

Targets

    • Target

      922374366d4bd0ac49bc5b2faa9d5b99277d28ffc50ff6538f44e77b42ab3d42

    • Size

      28.1MB

    • MD5

      cc7f8e64aa1a7f136c586cff8ec6e09d

    • SHA1

      8346c9c7e12e421e4effa20e6bbef7ff279adb2e

    • SHA256

      922374366d4bd0ac49bc5b2faa9d5b99277d28ffc50ff6538f44e77b42ab3d42

    • SHA512

      6318708209e0ca579e7254d18f1c33335ebd4da87a222cf343b22174135fd5024265e7bca93a7004dd96d3b047e906f0fe8b8b52425ada6710de4cca48d9f464

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks