General

  • Target

    8c41da324aa2605f0c6de1d4c902830e258d9d1e7a611c860b0327466a23e7d7

  • Size

    5.6MB

  • Sample

    220524-r9zsnafca5

  • MD5

    eaadf4d32da3039aaeed37f934c43d76

  • SHA1

    e04a92fb674553ea968f16cbe46a87bd34aea693

  • SHA256

    8c41da324aa2605f0c6de1d4c902830e258d9d1e7a611c860b0327466a23e7d7

  • SHA512

    d3de8a8b77653b02de26bda0c0fff65c53734810745c38fa475da7612d147285263ffcedc7e0bd8c166d0885919a11025fd9845de4669985df2614d79ad91aa3

Malware Config

Targets

    • Target

      8c41da324aa2605f0c6de1d4c902830e258d9d1e7a611c860b0327466a23e7d7

    • Size

      5.6MB

    • MD5

      eaadf4d32da3039aaeed37f934c43d76

    • SHA1

      e04a92fb674553ea968f16cbe46a87bd34aea693

    • SHA256

      8c41da324aa2605f0c6de1d4c902830e258d9d1e7a611c860b0327466a23e7d7

    • SHA512

      d3de8a8b77653b02de26bda0c0fff65c53734810745c38fa475da7612d147285263ffcedc7e0bd8c166d0885919a11025fd9845de4669985df2614d79ad91aa3

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks