General

  • Target

    156a15f3a6f9221792f48e6a8665b92fc6907b7f38e6430a5adccdc4b53170d0

  • Size

    164KB

  • Sample

    220609-h16p6sebh6

  • MD5

    d2a3ac7b7f79cdd211590623ebfde0dc

  • SHA1

    086cb767e2fc5e058b14643fa803140e0656fcda

  • SHA256

    156a15f3a6f9221792f48e6a8665b92fc6907b7f38e6430a5adccdc4b53170d0

  • SHA512

    bc88ec4006734a34669fdd003d729561f0c89a56f3b738c953700f6211b1a0e5f706382809897f8d0c4923e23a5a3133a6d5474f23be62d09666a36bda4d11af

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    194.236.7.34
  • Port:
    21
  • Username:
    coop-mp
  • Password:
    klyn65te

Targets

    • Target

      156a15f3a6f9221792f48e6a8665b92fc6907b7f38e6430a5adccdc4b53170d0

    • Size

      164KB

    • MD5

      d2a3ac7b7f79cdd211590623ebfde0dc

    • SHA1

      086cb767e2fc5e058b14643fa803140e0656fcda

    • SHA256

      156a15f3a6f9221792f48e6a8665b92fc6907b7f38e6430a5adccdc4b53170d0

    • SHA512

      bc88ec4006734a34669fdd003d729561f0c89a56f3b738c953700f6211b1a0e5f706382809897f8d0c4923e23a5a3133a6d5474f23be62d09666a36bda4d11af

    Score
    10/10
    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks