General

  • Target

    5c1948c5c0c236f1a657d173ab6f85225860459eb30001050da73e9990990818

  • Size

    540KB

  • Sample

    220801-s4ee7sbdh2

  • MD5

    1180625c9860111880fcd595f197332d

  • SHA1

    2366ae74cc62a03b5a77de4e2241b74409a3e42a

  • SHA256

    5c1948c5c0c236f1a657d173ab6f85225860459eb30001050da73e9990990818

  • SHA512

    b2f48683848b250ea61d63ef002d3a8e7086146ed99d52b43ea04acd836a7a3efd6210db76275ec61646bdf3c9ffcca7488f1a66872ea4f21490643b35437948

Malware Config

Targets

    • Target

      5c1948c5c0c236f1a657d173ab6f85225860459eb30001050da73e9990990818

    • Size

      540KB

    • MD5

      1180625c9860111880fcd595f197332d

    • SHA1

      2366ae74cc62a03b5a77de4e2241b74409a3e42a

    • SHA256

      5c1948c5c0c236f1a657d173ab6f85225860459eb30001050da73e9990990818

    • SHA512

      b2f48683848b250ea61d63ef002d3a8e7086146ed99d52b43ea04acd836a7a3efd6210db76275ec61646bdf3c9ffcca7488f1a66872ea4f21490643b35437948

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks