General

  • Target

    72ba6480d17b8b76d81f1537cea08269233d6c5264979bfa63d752ede04c24e4

  • Size

    504KB

  • Sample

    221003-dxkw3sfden

  • MD5

    6a5cf939e95799b748f3c211a025a69a

  • SHA1

    6518d0fd0dfe656ca17527d45f2927843b3634e0

  • SHA256

    72ba6480d17b8b76d81f1537cea08269233d6c5264979bfa63d752ede04c24e4

  • SHA512

    e2a1236d0971c7fa100d4fe32427299dfa539c90d402f72e39d9574494a37c553c8fac97a34be71c7f51b3919b441d529f7e9891aa2583d1fb72f7a72e43e397

  • SSDEEP

    12288:xgODlRMtwGxBlaSu1wFhRTape2h8CtKkbbSeWPA1mrahYJfuy:xgjjaqh72GCtXmrhf

Malware Config

Targets

    • Target

      72ba6480d17b8b76d81f1537cea08269233d6c5264979bfa63d752ede04c24e4

    • Size

      504KB

    • MD5

      6a5cf939e95799b748f3c211a025a69a

    • SHA1

      6518d0fd0dfe656ca17527d45f2927843b3634e0

    • SHA256

      72ba6480d17b8b76d81f1537cea08269233d6c5264979bfa63d752ede04c24e4

    • SHA512

      e2a1236d0971c7fa100d4fe32427299dfa539c90d402f72e39d9574494a37c553c8fac97a34be71c7f51b3919b441d529f7e9891aa2583d1fb72f7a72e43e397

    • SSDEEP

      12288:xgODlRMtwGxBlaSu1wFhRTape2h8CtKkbbSeWPA1mrahYJfuy:xgjjaqh72GCtXmrhf

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks