General

  • Target

    5be340d2dc4bb7eb82fc7bb2fd67824ea7dad45f84c0294c2dbd0b36e8fbe8db

  • Size

    8.4MB

  • Sample

    220524-cvgwzaffdl

  • MD5

    a66c75db6fa524e1046843d9530c7662

  • SHA1

    e04e909d51bc24e4ef0f78314d0b0e4f8b3a2eb9

  • SHA256

    5be340d2dc4bb7eb82fc7bb2fd67824ea7dad45f84c0294c2dbd0b36e8fbe8db

  • SHA512

    c1ccafa9656fe049f22313fcca83b3e7ec6ab518e23beb594b4b856831c16b93f25f5e54d230b70f88d277339298a965d3422dcff02f6ed2002cc47859c74a75

Malware Config

Targets

    • Target

      5be340d2dc4bb7eb82fc7bb2fd67824ea7dad45f84c0294c2dbd0b36e8fbe8db

    • Size

      8.4MB

    • MD5

      a66c75db6fa524e1046843d9530c7662

    • SHA1

      e04e909d51bc24e4ef0f78314d0b0e4f8b3a2eb9

    • SHA256

      5be340d2dc4bb7eb82fc7bb2fd67824ea7dad45f84c0294c2dbd0b36e8fbe8db

    • SHA512

      c1ccafa9656fe049f22313fcca83b3e7ec6ab518e23beb594b4b856831c16b93f25f5e54d230b70f88d277339298a965d3422dcff02f6ed2002cc47859c74a75

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks