General

  • Target

    ced11cfdf5fe272660ba907fa8733c3054787c9215c514421035c22617c4fe77

  • Size

    1.2MB

  • Sample

    220701-dmpsaabch5

  • MD5

    fc3fc7632950b12995b35f96eb6e09d1

  • SHA1

    b111084113f7b9aba6c0f8f3cb03f1972c7433aa

  • SHA256

    ced11cfdf5fe272660ba907fa8733c3054787c9215c514421035c22617c4fe77

  • SHA512

    18b6ef3a6ce18972034805fe7cbc62c802335b2dc909d9ecf54c7e36c9f6707d3a5b862768a7a15e7c58529d42168f165e0f82398148dba3922adf724f9bda9c

Malware Config

Targets

    • Target

      ced11cfdf5fe272660ba907fa8733c3054787c9215c514421035c22617c4fe77

    • Size

      1.2MB

    • MD5

      fc3fc7632950b12995b35f96eb6e09d1

    • SHA1

      b111084113f7b9aba6c0f8f3cb03f1972c7433aa

    • SHA256

      ced11cfdf5fe272660ba907fa8733c3054787c9215c514421035c22617c4fe77

    • SHA512

      18b6ef3a6ce18972034805fe7cbc62c802335b2dc909d9ecf54c7e36c9f6707d3a5b862768a7a15e7c58529d42168f165e0f82398148dba3922adf724f9bda9c

    • 404 Keylogger

      Information stealer and keylogger first seen in 2019.

    • 404 Keylogger Main Executable

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks