General

  • Target

    02b83b83fffb20aeb53e520e075f684d340a7569f57dac95474895ee06250a27

  • Size

    6.1MB

  • Sample

    220524-a9y3paebgk

  • MD5

    fd5404ba372370044fed6b71d0b09d2b

  • SHA1

    fe246af6cf8c5ada290fbc9a45c998402d9f37bf

  • SHA256

    02b83b83fffb20aeb53e520e075f684d340a7569f57dac95474895ee06250a27

  • SHA512

    17c8d6223afcbaa2dd14cea2b65a19ca0ea939d83d0948e9ed02cc941a60795c8dc201c41bae356069fd5784fedeac8eec98d7441b9a178bce6037e5dc2e5eba

Malware Config

Targets

    • Target

      02b83b83fffb20aeb53e520e075f684d340a7569f57dac95474895ee06250a27

    • Size

      6.1MB

    • MD5

      fd5404ba372370044fed6b71d0b09d2b

    • SHA1

      fe246af6cf8c5ada290fbc9a45c998402d9f37bf

    • SHA256

      02b83b83fffb20aeb53e520e075f684d340a7569f57dac95474895ee06250a27

    • SHA512

      17c8d6223afcbaa2dd14cea2b65a19ca0ea939d83d0948e9ed02cc941a60795c8dc201c41bae356069fd5784fedeac8eec98d7441b9a178bce6037e5dc2e5eba

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks