General

  • Target

    4fb80be69d6e2792c363a2e9a0083b786a90b90995aa14c091c6658edb188de6

  • Size

    829KB

  • Sample

    220719-zx5gdadag2

  • MD5

    2cfe62a4b6477f49bcb39489ac799406

  • SHA1

    ad1ea2f9cc41d380508bf9d7a53ad69096133a32

  • SHA256

    4fb80be69d6e2792c363a2e9a0083b786a90b90995aa14c091c6658edb188de6

  • SHA512

    0d186ab978618c0ac5ef4e561d3b4964e23b6fd3868cf67380e866a100a6fb948f6e40975d192cb9cac542ca830fc2defa72b10168230967bf1adae46d9afea1

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.spytector.com
  • Port:
    21
  • Username:
    gings@spytector.com
  • Password:
    751g902S

Targets

    • Target

      4fb80be69d6e2792c363a2e9a0083b786a90b90995aa14c091c6658edb188de6

    • Size

      829KB

    • MD5

      2cfe62a4b6477f49bcb39489ac799406

    • SHA1

      ad1ea2f9cc41d380508bf9d7a53ad69096133a32

    • SHA256

      4fb80be69d6e2792c363a2e9a0083b786a90b90995aa14c091c6658edb188de6

    • SHA512

      0d186ab978618c0ac5ef4e561d3b4964e23b6fd3868cf67380e866a100a6fb948f6e40975d192cb9cac542ca830fc2defa72b10168230967bf1adae46d9afea1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks