General

  • Target

    Key.exe

  • Size

    17.3MB

  • Sample

    221003-njczesdgck

  • MD5

    f7c14c4a06f1282d806ec6150a75ccae

  • SHA1

    4290809a05f607b423374c7c3bb7201755b8931e

  • SHA256

    5eedb5dd038c4fc1e19840740af6d193e619a09054922af5e52cf86a8de811dd

  • SHA512

    b33381c359a779e39187b364b21cccd4b9046e0de41f94633711058d0d3db3426a3f43f97ec7af52d50b37668efc43b89f97c3a20face950781afbece93577b1

  • SSDEEP

    393216:3xqK1obI/CL2Vmd6mI/m3pCc/eO47G99MqBJHRLJ/GDwKQab7h:3r1h/CyVmdiKCuP+gxt/XKQc7h

Malware Config

Targets

    • Target

      Key.exe

    • Size

      17.3MB

    • MD5

      f7c14c4a06f1282d806ec6150a75ccae

    • SHA1

      4290809a05f607b423374c7c3bb7201755b8931e

    • SHA256

      5eedb5dd038c4fc1e19840740af6d193e619a09054922af5e52cf86a8de811dd

    • SHA512

      b33381c359a779e39187b364b21cccd4b9046e0de41f94633711058d0d3db3426a3f43f97ec7af52d50b37668efc43b89f97c3a20face950781afbece93577b1

    • SSDEEP

      393216:3xqK1obI/CL2Vmd6mI/m3pCc/eO47G99MqBJHRLJ/GDwKQab7h:3r1h/CyVmdiKCuP+gxt/XKQc7h

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks