General

  • Target

    1aab932b595f9e3d750577e005ae02e77719692c81dd40185dc8854445a034ea

  • Size

    10.6MB

  • Sample

    220512-n8v7asgeap

  • MD5

    6e1f5d02cc44f4af5d59a4071b538b4c

  • SHA1

    10892bfb5920b819448479a2c32807ce5114845b

  • SHA256

    1aab932b595f9e3d750577e005ae02e77719692c81dd40185dc8854445a034ea

  • SHA512

    683fafe3d26d663055a0c83234453aa4cf07ce95f5d51fe598769a69b9b2844b8b53ad4931085fb197112fa03c8f36181919c6be6fd88fe57b2a871b936cdfa1

Malware Config

Targets

    • Target

      1aab932b595f9e3d750577e005ae02e77719692c81dd40185dc8854445a034ea

    • Size

      10.6MB

    • MD5

      6e1f5d02cc44f4af5d59a4071b538b4c

    • SHA1

      10892bfb5920b819448479a2c32807ce5114845b

    • SHA256

      1aab932b595f9e3d750577e005ae02e77719692c81dd40185dc8854445a034ea

    • SHA512

      683fafe3d26d663055a0c83234453aa4cf07ce95f5d51fe598769a69b9b2844b8b53ad4931085fb197112fa03c8f36181919c6be6fd88fe57b2a871b936cdfa1

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks