General

  • Target

    d9a9274c182b0a818cce63e3419a13ecc52c634dae14ee925baa059793c6f54f

  • Size

    6.6MB

  • Sample

    220524-z74ylacdak

  • MD5

    48d7f54385656995f8baacb92e802d03

  • SHA1

    85f9fa5a2a4ce848231d3c87d3def3aae7dd054b

  • SHA256

    d9a9274c182b0a818cce63e3419a13ecc52c634dae14ee925baa059793c6f54f

  • SHA512

    47d8fff8234ab9d0aa75193a5cb8ce6ca8371148685aca75b73cc172997cff2471eda9c4c8174cee3327f86c7ddd850085f171ead2aa102196dfdd1389c09a46

Malware Config

Targets

    • Target

      d9a9274c182b0a818cce63e3419a13ecc52c634dae14ee925baa059793c6f54f

    • Size

      6.6MB

    • MD5

      48d7f54385656995f8baacb92e802d03

    • SHA1

      85f9fa5a2a4ce848231d3c87d3def3aae7dd054b

    • SHA256

      d9a9274c182b0a818cce63e3419a13ecc52c634dae14ee925baa059793c6f54f

    • SHA512

      47d8fff8234ab9d0aa75193a5cb8ce6ca8371148685aca75b73cc172997cff2471eda9c4c8174cee3327f86c7ddd850085f171ead2aa102196dfdd1389c09a46

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks