General

  • Target

    3f0be1187ffe25756a13be39d61e85a2d34e88709a3ee757e3e0caa1e1776c01

  • Size

    5.0MB

  • Sample

    220516-p93hfafafn

  • MD5

    c0fff0b1110014b4b891dd7f80b501df

  • SHA1

    b2f3f84ce4df05ab79973d51cb3875d69ae7fbbb

  • SHA256

    3f0be1187ffe25756a13be39d61e85a2d34e88709a3ee757e3e0caa1e1776c01

  • SHA512

    7eeee669630d02caf9775b9eabca4d659dcfca8ec40cffe08ad4e3c7c29c247e763b23618e716ebb3fd3e92549a37b43acd94239b46465ba3aba3b38320ae0a3

Malware Config

Targets

    • Target

      3f0be1187ffe25756a13be39d61e85a2d34e88709a3ee757e3e0caa1e1776c01

    • Size

      5.0MB

    • MD5

      c0fff0b1110014b4b891dd7f80b501df

    • SHA1

      b2f3f84ce4df05ab79973d51cb3875d69ae7fbbb

    • SHA256

      3f0be1187ffe25756a13be39d61e85a2d34e88709a3ee757e3e0caa1e1776c01

    • SHA512

      7eeee669630d02caf9775b9eabca4d659dcfca8ec40cffe08ad4e3c7c29c247e763b23618e716ebb3fd3e92549a37b43acd94239b46465ba3aba3b38320ae0a3

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks