General

  • Target

    65bd88e65e96c4a31a5e1d7319a39501d31a71af39dac737c7b8a522e17638d0

  • Size

    356KB

  • Sample

    221020-g93t7shfbm

  • MD5

    749557b9bf09fc97051bb7f828aa7c00

  • SHA1

    e02875b5c7352edeac8b65a11f4056c4474cd3ac

  • SHA256

    65bd88e65e96c4a31a5e1d7319a39501d31a71af39dac737c7b8a522e17638d0

  • SHA512

    22db299e2d5734e53eff7c553d25e8d31ec5fc979c035a830a9b3436e206673336ef2a90e429150e66892bde3633014c57cd2278cfd80094694e728d51abf7a6

  • SSDEEP

    6144:cYb//1PxwAdIKCC0ef//uXltKc+LVsz9b8R4jvLXouZTDysTh:cAdFeCXuLKcCVsz6SDLXocXyih

Malware Config

Targets

    • Target

      65bd88e65e96c4a31a5e1d7319a39501d31a71af39dac737c7b8a522e17638d0

    • Size

      356KB

    • MD5

      749557b9bf09fc97051bb7f828aa7c00

    • SHA1

      e02875b5c7352edeac8b65a11f4056c4474cd3ac

    • SHA256

      65bd88e65e96c4a31a5e1d7319a39501d31a71af39dac737c7b8a522e17638d0

    • SHA512

      22db299e2d5734e53eff7c553d25e8d31ec5fc979c035a830a9b3436e206673336ef2a90e429150e66892bde3633014c57cd2278cfd80094694e728d51abf7a6

    • SSDEEP

      6144:cYb//1PxwAdIKCC0ef//uXltKc+LVsz9b8R4jvLXouZTDysTh:cAdFeCXuLKcCVsz6SDLXocXyih

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks