General

  • Target

    360ee7c2050099bc70fefb95cfaa1dc8e5d72ded800414bae3c068b866fbc222

  • Size

    6.1MB

  • Sample

    220512-n8n3zsdgb5

  • MD5

    0ea731cc96499bebb50a50171900ee77

  • SHA1

    7dc70d813af718285ec607ebf58800410af164f9

  • SHA256

    360ee7c2050099bc70fefb95cfaa1dc8e5d72ded800414bae3c068b866fbc222

  • SHA512

    8151f7af93556aea1bdbd9b6b5c8b7e02898e01e2779a7da1b0d25623395706e2f43fbc26faa9a50a2b6b3cca7f75461e38d3177582f3bc1ebe803c404b8aacb

Malware Config

Targets

    • Target

      360ee7c2050099bc70fefb95cfaa1dc8e5d72ded800414bae3c068b866fbc222

    • Size

      6.1MB

    • MD5

      0ea731cc96499bebb50a50171900ee77

    • SHA1

      7dc70d813af718285ec607ebf58800410af164f9

    • SHA256

      360ee7c2050099bc70fefb95cfaa1dc8e5d72ded800414bae3c068b866fbc222

    • SHA512

      8151f7af93556aea1bdbd9b6b5c8b7e02898e01e2779a7da1b0d25623395706e2f43fbc26faa9a50a2b6b3cca7f75461e38d3177582f3bc1ebe803c404b8aacb

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks