General

  • Target

    4d513bdf8dd3e25dc83842c0b40311b4f3473a20954e32701097c9c1af266fec

  • Size

    444KB

  • Sample

    220521-nsnghseag8

  • MD5

    9744f82eeca4f14d94c2ad9cede087c3

  • SHA1

    1323f9e807c5ade71b1f67d489e2ebafd574faaf

  • SHA256

    4d513bdf8dd3e25dc83842c0b40311b4f3473a20954e32701097c9c1af266fec

  • SHA512

    d1a0fbdda4fc4e95eecbd18b3f800b1494d5bdd5ab1b3c86eb9a4d4fc62fef9a5ac58f9939bb9c6770f38e2090818e05adfa09a5bbf1592274f3cb91cd1ba320

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    sly-originlogs@yandex.ru
  • Password:
    JesusChrist007

Targets

    • Target

      STATEMENT OF ACCOUNT.exe

    • Size

      515KB

    • MD5

      1fb7e84ceaa0d66100e242b493b003ef

    • SHA1

      2e9ec07aaa9dc744e8bfad320a2b7df0a8a7301b

    • SHA256

      d91e999a7466f56e8cc31598ac1735c57a6d864fb8eb5044fc6a1bcf8f5f4f13

    • SHA512

      13f34af2473eb0d2f2cfd609b840df48bf3b93e8d1be25400d23cafac90fd2d640a31c496b1d01ea5da1c2315b4a1caa298d08ef56e6cca929fe73b17d60e802

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks