General

  • Target

    85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d

  • Size

    332KB

  • Sample

    220724-z7v1paggh9

  • MD5

    173ec773d0b146dfb249629550901ded

  • SHA1

    7bfa3586a135f95dba15b00385d8eec2f838d2be

  • SHA256

    85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d

  • SHA512

    a2a82ce38c42faa77acf038fecc7c95c1729d5d49ccbd6eb36e24d5f61c0435c633ba217cbde54df02623dc0092e4555c14b809ba0095d74a88ee123b956480f

Malware Config

Targets

    • Target

      85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d

    • Size

      332KB

    • MD5

      173ec773d0b146dfb249629550901ded

    • SHA1

      7bfa3586a135f95dba15b00385d8eec2f838d2be

    • SHA256

      85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d

    • SHA512

      a2a82ce38c42faa77acf038fecc7c95c1729d5d49ccbd6eb36e24d5f61c0435c633ba217cbde54df02623dc0092e4555c14b809ba0095d74a88ee123b956480f

    • 404 Keylogger

      Information stealer and keylogger first seen in 2019.

    • 404 Keylogger Main Executable

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks