General

  • Target

    46697ceb0ffef2223395d594e933a25f01fcb71ec1e8d012588b0a522e69b4fd

  • Size

    8.5MB

  • Sample

    220511-c7ay7agfbp

  • MD5

    a564b063ebf51439468cecb3b714c637

  • SHA1

    c235dd993132a849d96c0b2d1ea778da9c31bd06

  • SHA256

    46697ceb0ffef2223395d594e933a25f01fcb71ec1e8d012588b0a522e69b4fd

  • SHA512

    bd2c92327f2909f7518e62330a2ca59d33e20b64076f1ed5812d97f31fedd7c295ca8d08c432390548f4bd9ab9e5096b708a2da3d7a038c5674a35842f9a087b

Malware Config

Targets

    • Target

      46697ceb0ffef2223395d594e933a25f01fcb71ec1e8d012588b0a522e69b4fd

    • Size

      8.5MB

    • MD5

      a564b063ebf51439468cecb3b714c637

    • SHA1

      c235dd993132a849d96c0b2d1ea778da9c31bd06

    • SHA256

      46697ceb0ffef2223395d594e933a25f01fcb71ec1e8d012588b0a522e69b4fd

    • SHA512

      bd2c92327f2909f7518e62330a2ca59d33e20b64076f1ed5812d97f31fedd7c295ca8d08c432390548f4bd9ab9e5096b708a2da3d7a038c5674a35842f9a087b

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks