General

  • Target

    3ad0eb626ba66c814a3a969cca0ee2e6e9887a8c953c4ae9b0a78a0a2e6d49cc

  • Size

    15.2MB

  • Sample

    220521-abbvhahhf8

  • MD5

    533dccd57bfeb97ae84a94b3a5350d85

  • SHA1

    162862bb2c5311ac852db660c41325958f1d6e03

  • SHA256

    3ad0eb626ba66c814a3a969cca0ee2e6e9887a8c953c4ae9b0a78a0a2e6d49cc

  • SHA512

    f1e013bd178d11b90a8454d6486220e0f67cee8082d00028c57fb92c7f2b5be321b2bd2aa3a9a515caa8b9186ec216b2bffabd46a2dd95013c0017f0eee1d14f

Malware Config

Targets

    • Target

      3ad0eb626ba66c814a3a969cca0ee2e6e9887a8c953c4ae9b0a78a0a2e6d49cc

    • Size

      15.2MB

    • MD5

      533dccd57bfeb97ae84a94b3a5350d85

    • SHA1

      162862bb2c5311ac852db660c41325958f1d6e03

    • SHA256

      3ad0eb626ba66c814a3a969cca0ee2e6e9887a8c953c4ae9b0a78a0a2e6d49cc

    • SHA512

      f1e013bd178d11b90a8454d6486220e0f67cee8082d00028c57fb92c7f2b5be321b2bd2aa3a9a515caa8b9186ec216b2bffabd46a2dd95013c0017f0eee1d14f

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks