General

  • Target

    b55ccd19c66f900693f45d7e180bde3f2cda393929b0cea81cbc494e4f43ab1c

  • Size

    6.1MB

  • Sample

    220524-vbl1paaad6

  • MD5

    f886e708d2ced1e62953d6016c67719e

  • SHA1

    19c87be30a63aa5ab074908a8964eac5975ac8c2

  • SHA256

    b55ccd19c66f900693f45d7e180bde3f2cda393929b0cea81cbc494e4f43ab1c

  • SHA512

    cbf90b241b0ebbdb104d30ac1659ed6ce002eb1db9c3cf34778c725ab3db92187ca676199075285153f73e030d1bea06d67c72ceb72a792d54890f8558f1b6c1

Malware Config

Targets

    • Target

      b55ccd19c66f900693f45d7e180bde3f2cda393929b0cea81cbc494e4f43ab1c

    • Size

      6.1MB

    • MD5

      f886e708d2ced1e62953d6016c67719e

    • SHA1

      19c87be30a63aa5ab074908a8964eac5975ac8c2

    • SHA256

      b55ccd19c66f900693f45d7e180bde3f2cda393929b0cea81cbc494e4f43ab1c

    • SHA512

      cbf90b241b0ebbdb104d30ac1659ed6ce002eb1db9c3cf34778c725ab3db92187ca676199075285153f73e030d1bea06d67c72ceb72a792d54890f8558f1b6c1

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks