General

  • Target

    7dd819a5eeb9ebf98bc50941f08f22f31c9b51758fcb19df1adfc42a3be8a9bf

  • Size

    660KB

  • Sample

    220919-q4epvsbec2

  • MD5

    da4f3dc4c232e5fcd020917d92a35c31

  • SHA1

    40d7d86c900c4dfdb89ad7a523fc782b01812a3c

  • SHA256

    7dd819a5eeb9ebf98bc50941f08f22f31c9b51758fcb19df1adfc42a3be8a9bf

  • SHA512

    a324acbbbfb8dfd21adfdd334b1ccc9605345568a20e03dbb0c2b9b2ea9fca69aab1db4bb77e0e17695c5727c455dbda101fe66ec9d4f65a17af30a9ace22b0a

  • SSDEEP

    12288:i7pi/pxs3uzjK+s4342rpINUa48rA0hPG0lfkY:i1ifs3uzj5dzJa48UYG0lcY

Malware Config

Targets

    • Target

      7dd819a5eeb9ebf98bc50941f08f22f31c9b51758fcb19df1adfc42a3be8a9bf

    • Size

      660KB

    • MD5

      da4f3dc4c232e5fcd020917d92a35c31

    • SHA1

      40d7d86c900c4dfdb89ad7a523fc782b01812a3c

    • SHA256

      7dd819a5eeb9ebf98bc50941f08f22f31c9b51758fcb19df1adfc42a3be8a9bf

    • SHA512

      a324acbbbfb8dfd21adfdd334b1ccc9605345568a20e03dbb0c2b9b2ea9fca69aab1db4bb77e0e17695c5727c455dbda101fe66ec9d4f65a17af30a9ace22b0a

    • SSDEEP

      12288:i7pi/pxs3uzjK+s4342rpINUa48rA0hPG0lfkY:i1ifs3uzj5dzJa48UYG0lcY

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks