General

  • Target

    e8074d91ec305ca2796b85b2e32aad7d3e28c2bf277438e40cdac6d119dd5acf

  • Size

    277KB

  • Sample

    220724-snbz5sged7

  • MD5

    0e8fb608a3c632fefbfb15e4a9c1830a

  • SHA1

    f31edddf46af8f814c7596c4ddf89248233e8027

  • SHA256

    e8074d91ec305ca2796b85b2e32aad7d3e28c2bf277438e40cdac6d119dd5acf

  • SHA512

    0c673d9fddcedb7b816f87e2a247934ae818a3709693755f7f0a0e08e2aa4fc1ef82c8059167ccf9b2e9f8d55a2d84b8d361921a5cf046a901770fb280f37751

Malware Config

Targets

    • Target

      e8074d91ec305ca2796b85b2e32aad7d3e28c2bf277438e40cdac6d119dd5acf

    • Size

      277KB

    • MD5

      0e8fb608a3c632fefbfb15e4a9c1830a

    • SHA1

      f31edddf46af8f814c7596c4ddf89248233e8027

    • SHA256

      e8074d91ec305ca2796b85b2e32aad7d3e28c2bf277438e40cdac6d119dd5acf

    • SHA512

      0c673d9fddcedb7b816f87e2a247934ae818a3709693755f7f0a0e08e2aa4fc1ef82c8059167ccf9b2e9f8d55a2d84b8d361921a5cf046a901770fb280f37751

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks