General

  • Target

    81f47363dc2137c3c6098589833077bc64c4531668d278b93e515ffcfb547303

  • Size

    784KB

  • Sample

    220714-bb2atsegcm

  • MD5

    f0904f0e7805e84c9ca0b12236f717ea

  • SHA1

    7a0725bbaf47687b877f6ceb63dfa695f1d6197e

  • SHA256

    81f47363dc2137c3c6098589833077bc64c4531668d278b93e515ffcfb547303

  • SHA512

    fb89583439b006add490d2c79395ca33f3cdb8492e31a21656c32896fe64c8307a4dc74bfbfd2052b2ab14535b5c6194896f21db5cc4d1ce3dcd60aa01febcfe

Malware Config

Targets

    • Target

      scan0002992, xlxs.exe

    • Size

      724KB

    • MD5

      8c801bcd5404e6951355e5a128c95fca

    • SHA1

      0cb59615e4e19d3c56f08998e775c4b40c90ceda

    • SHA256

      ea2b0fcd4c2149b99d1fa98e4f67baeee2b827db770d68ea2202be1402c7e31a

    • SHA512

      b065e7ca45322e4fc572160fa46a667146d9f3f86493c71c92d9b038c350797d2eb314900dd84d784f3cacbd0ee56b39ac6046b8a3015b21afb31fb6824e416c

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger payload

      Detects M00nD3v Logger payload in memory.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks