General

  • Target

    WinCreds.exe

  • Size

    9.0MB

  • Sample

    220513-adg5aseahr

  • MD5

    e3ace3232f1a845653c3d4aa6c8b185e

  • SHA1

    71a38e4c7dc80b75578ee68e6f0bab65c05b06cd

  • SHA256

    ef900849dd6e51984ebed64ad27e5693187d3fc2ddbbbec0e92d18a95200abe9

  • SHA512

    264a1f46418ec2398347e222bacd389db5880751ea50d5d80e887f4ae231f76ae12675233cba1c5ff0ed0185137112ca2584fd68218d2232bc2583ffb67505d3

Malware Config

Targets

    • Target

      WinCreds.exe

    • Size

      9.0MB

    • MD5

      e3ace3232f1a845653c3d4aa6c8b185e

    • SHA1

      71a38e4c7dc80b75578ee68e6f0bab65c05b06cd

    • SHA256

      ef900849dd6e51984ebed64ad27e5693187d3fc2ddbbbec0e92d18a95200abe9

    • SHA512

      264a1f46418ec2398347e222bacd389db5880751ea50d5d80e887f4ae231f76ae12675233cba1c5ff0ed0185137112ca2584fd68218d2232bc2583ffb67505d3

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks