General

  • Target

    49115966741915c3cf2ff0ea0298fd73d00da665eff5f5595f35957ac40a00a7

  • Size

    561KB

  • Sample

    220714-bb275ahga3

  • MD5

    0fe12aa5610cfcc6f86b7378c5e39f6d

  • SHA1

    2ae0ccc66797d33959f4cb8c5f56ee401b8b7d14

  • SHA256

    49115966741915c3cf2ff0ea0298fd73d00da665eff5f5595f35957ac40a00a7

  • SHA512

    5f53925e007c1f4e7cff3b613417270f0a0711288481d402e093cd102bf7235aa2849d1936dfede91d7f53271adfdbd467bbb19c8007531ce83f6af6359298e0

Malware Config

Targets

    • Target

      scan0002992, xlxs.exe

    • Size

      724KB

    • MD5

      8c801bcd5404e6951355e5a128c95fca

    • SHA1

      0cb59615e4e19d3c56f08998e775c4b40c90ceda

    • SHA256

      ea2b0fcd4c2149b99d1fa98e4f67baeee2b827db770d68ea2202be1402c7e31a

    • SHA512

      b065e7ca45322e4fc572160fa46a667146d9f3f86493c71c92d9b038c350797d2eb314900dd84d784f3cacbd0ee56b39ac6046b8a3015b21afb31fb6824e416c

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger payload

      Detects M00nD3v Logger payload in memory.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks