General

  • Target

    23e688569cd83f678cb34072356d0c6771823674cec068b39379835d6b80c4fe

  • Size

    5.4MB

  • Sample

    220520-gmtysafhdj

  • MD5

    be326ce4403d85537122c48c68344745

  • SHA1

    75c4e1f9af7e930a4b28d798eecc50a439f01c35

  • SHA256

    23e688569cd83f678cb34072356d0c6771823674cec068b39379835d6b80c4fe

  • SHA512

    bcfda9ea07bb20a66fa5481a2a4920c96ff077910fc7a0c16f8bd7759858d02833171bfbec2b1cbcd3f1af254c3c9de5730529bf6585f8e39d4e268584ba4d08

Malware Config

Targets

    • Target

      23e688569cd83f678cb34072356d0c6771823674cec068b39379835d6b80c4fe

    • Size

      5.4MB

    • MD5

      be326ce4403d85537122c48c68344745

    • SHA1

      75c4e1f9af7e930a4b28d798eecc50a439f01c35

    • SHA256

      23e688569cd83f678cb34072356d0c6771823674cec068b39379835d6b80c4fe

    • SHA512

      bcfda9ea07bb20a66fa5481a2a4920c96ff077910fc7a0c16f8bd7759858d02833171bfbec2b1cbcd3f1af254c3c9de5730529bf6585f8e39d4e268584ba4d08

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks