General

  • Target

    002bfda1e6e6101d1b5ba346890e320319357bc8bd94ed9f1db0ecbc40d7dc4a

  • Size

    8.5MB

  • Sample

    220511-c7k46adhf4

  • MD5

    d8050af25fb5a20dbe9b341a123cc52d

  • SHA1

    c6f2ea2a6e10142245746daff938627478045c75

  • SHA256

    002bfda1e6e6101d1b5ba346890e320319357bc8bd94ed9f1db0ecbc40d7dc4a

  • SHA512

    f35325ad04bac99e8d6e60ac0a9a5144aabaac352f97f6f8e39aa056727a05f9b59402b44372e8c0a783a9f2237264fb5edfd7920b40a813ce830be32dea7a35

Malware Config

Targets

    • Target

      002bfda1e6e6101d1b5ba346890e320319357bc8bd94ed9f1db0ecbc40d7dc4a

    • Size

      8.5MB

    • MD5

      d8050af25fb5a20dbe9b341a123cc52d

    • SHA1

      c6f2ea2a6e10142245746daff938627478045c75

    • SHA256

      002bfda1e6e6101d1b5ba346890e320319357bc8bd94ed9f1db0ecbc40d7dc4a

    • SHA512

      f35325ad04bac99e8d6e60ac0a9a5144aabaac352f97f6f8e39aa056727a05f9b59402b44372e8c0a783a9f2237264fb5edfd7920b40a813ce830be32dea7a35

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks