General

  • Target

    72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20

  • Size

    684KB

  • Sample

    221030-jmlzaahhf6

  • MD5

    93533097a256398b5acdbe8983acdacd

  • SHA1

    1c12702a274ae43d4d712afe3c2f438d6020a0dd

  • SHA256

    72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20

  • SHA512

    e0bdd70f4594e4fae097a414bebf4accbce7c85b2e68ed809c947032bcb408cbcb6c7174ba64c380f69963db88e470f36f7412e5c262a59bf86456db8c52a468

  • SSDEEP

    12288:0/XM4DShe9EcHPLrLZ5AICgkTP3/j3r3ZBIRjD68wBxGsHmmvV9RnCbzvYej:AM4DSs9FvzAICgkTjjZB2oGmvDRnY1

Score
10/10

Malware Config

Targets

    • Target

      72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20

    • Size

      684KB

    • MD5

      93533097a256398b5acdbe8983acdacd

    • SHA1

      1c12702a274ae43d4d712afe3c2f438d6020a0dd

    • SHA256

      72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20

    • SHA512

      e0bdd70f4594e4fae097a414bebf4accbce7c85b2e68ed809c947032bcb408cbcb6c7174ba64c380f69963db88e470f36f7412e5c262a59bf86456db8c52a468

    • SSDEEP

      12288:0/XM4DShe9EcHPLrLZ5AICgkTP3/j3r3ZBIRjD68wBxGsHmmvV9RnCbzvYej:AM4DSs9FvzAICgkTjjZB2oGmvDRnY1

    Score
    10/10
    • Modifies firewall policy service

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks