General

  • Target

    8e0c4b4304e5fc13d194a6a59c1f65c54d8e89386cb147a84ac6da16b0f39298

  • Size

    92KB

  • Sample

    221107-nx9kjsgfdk

  • MD5

    0781f3200dbf3c7572a71f7a158f3191

  • SHA1

    41c189ea2697a3ff17e8f1b94475dcd9216a096a

  • SHA256

    8e0c4b4304e5fc13d194a6a59c1f65c54d8e89386cb147a84ac6da16b0f39298

  • SHA512

    351b701ec349157846c286e5110d8096ef52a43b32b62d1d2c1d7e810e2582dc23a3c3f6175a2d36734f4ec77561cf21e4869fbbbea587e104ff261c826894fa

  • SSDEEP

    1536:8p3o/E+9NxUrLv0qLF5swFa04jDG8mcT9XkSYcFDc2FaSw:g3o/EQUrXXlFVMt5kS1c2hw

Malware Config

Targets

    • Target

      8e0c4b4304e5fc13d194a6a59c1f65c54d8e89386cb147a84ac6da16b0f39298

    • Size

      92KB

    • MD5

      0781f3200dbf3c7572a71f7a158f3191

    • SHA1

      41c189ea2697a3ff17e8f1b94475dcd9216a096a

    • SHA256

      8e0c4b4304e5fc13d194a6a59c1f65c54d8e89386cb147a84ac6da16b0f39298

    • SHA512

      351b701ec349157846c286e5110d8096ef52a43b32b62d1d2c1d7e810e2582dc23a3c3f6175a2d36734f4ec77561cf21e4869fbbbea587e104ff261c826894fa

    • SSDEEP

      1536:8p3o/E+9NxUrLv0qLF5swFa04jDG8mcT9XkSYcFDc2FaSw:g3o/EQUrXXlFVMt5kS1c2hw

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks