General

  • Target

    7b619ad96f1e9e154f59227a36693842eb0d10a99a7307ff2afb11fd877f6d57

  • Size

    8.6MB

  • Sample

    220512-n71qdsdfh9

  • MD5

    0be819d2ffe6eb39a59ac0aa9a55c8b2

  • SHA1

    a07d9c1d14113edf954e773212201e733fb8326b

  • SHA256

    7b619ad96f1e9e154f59227a36693842eb0d10a99a7307ff2afb11fd877f6d57

  • SHA512

    d900b5ca5fe5e73563b949e07697bce228ff5cd6d022c493a0048e97126d345ed69bcb507fbe76d0a2e7078da8d19d617982de300f700ce48c565b8cd240e788

Malware Config

Targets

    • Target

      7b619ad96f1e9e154f59227a36693842eb0d10a99a7307ff2afb11fd877f6d57

    • Size

      8.6MB

    • MD5

      0be819d2ffe6eb39a59ac0aa9a55c8b2

    • SHA1

      a07d9c1d14113edf954e773212201e733fb8326b

    • SHA256

      7b619ad96f1e9e154f59227a36693842eb0d10a99a7307ff2afb11fd877f6d57

    • SHA512

      d900b5ca5fe5e73563b949e07697bce228ff5cd6d022c493a0048e97126d345ed69bcb507fbe76d0a2e7078da8d19d617982de300f700ce48c565b8cd240e788

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks