General

  • Target

    2c4e97364faf355dc05f3b22ec4fcec792c70c2a60ee715ab4a747d77308a0b8

  • Size

    464KB

  • Sample

    221123-r2x9vsac23

  • MD5

    942b2574d9adfaa722158d318f0d4604

  • SHA1

    422a28404340c9aea268dc825c734cde57040cbd

  • SHA256

    2c4e97364faf355dc05f3b22ec4fcec792c70c2a60ee715ab4a747d77308a0b8

  • SHA512

    59c8d23de2dece924b9a808ca4175a2125ef3e26fde4ff8d379e144b572cb14b218ea6c74b8cb4431565a5e5baae9858afd0b54b1c51c9f44e5a5075d7b92f5d

  • SSDEEP

    12288:t6oo3/5+aEYjI9G3eLTxCqIjVhm9Qtn8ZzzUmTebjHK1/lIzfC:XogaEYjR3eLTxOhm9qy4mTP

Malware Config

Targets

    • Target

      2c4e97364faf355dc05f3b22ec4fcec792c70c2a60ee715ab4a747d77308a0b8

    • Size

      464KB

    • MD5

      942b2574d9adfaa722158d318f0d4604

    • SHA1

      422a28404340c9aea268dc825c734cde57040cbd

    • SHA256

      2c4e97364faf355dc05f3b22ec4fcec792c70c2a60ee715ab4a747d77308a0b8

    • SHA512

      59c8d23de2dece924b9a808ca4175a2125ef3e26fde4ff8d379e144b572cb14b218ea6c74b8cb4431565a5e5baae9858afd0b54b1c51c9f44e5a5075d7b92f5d

    • SSDEEP

      12288:t6oo3/5+aEYjI9G3eLTxCqIjVhm9Qtn8ZzzUmTebjHK1/lIzfC:XogaEYjR3eLTxOhm9qy4mTP

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks