General

  • Target

    f350e71fff2a223af991bf9371765ba8ce081971316f1cff2b1a1f3d8c1fe672

  • Size

    972KB

  • Sample

    221123-wmtekscd73

  • MD5

    4c41324bb4e65eb62a2b817c69a5a86d

  • SHA1

    8b52e1cf9c56c75f5492015c4d08f62fcc8849df

  • SHA256

    f350e71fff2a223af991bf9371765ba8ce081971316f1cff2b1a1f3d8c1fe672

  • SHA512

    f8c8951404556dbbbf05aa039686c0d7de0340a336210ea66b63a3def514c60aa6805accff8094556a312f4174ddc7c642b514dc579ce09fe1c4a2031e03c538

  • SSDEEP

    12288:Lv1H9GM9a/rHC60G4T/+CRz9hBXtB8kPC9xrOMe7BG/MEEbbt27QkMQAp0R/QCAH:LvJ45/2XG4hXXnSadaruwddZvGcfN/vw

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    talnah0515

Targets

    • Target

      f350e71fff2a223af991bf9371765ba8ce081971316f1cff2b1a1f3d8c1fe672

    • Size

      972KB

    • MD5

      4c41324bb4e65eb62a2b817c69a5a86d

    • SHA1

      8b52e1cf9c56c75f5492015c4d08f62fcc8849df

    • SHA256

      f350e71fff2a223af991bf9371765ba8ce081971316f1cff2b1a1f3d8c1fe672

    • SHA512

      f8c8951404556dbbbf05aa039686c0d7de0340a336210ea66b63a3def514c60aa6805accff8094556a312f4174ddc7c642b514dc579ce09fe1c4a2031e03c538

    • SSDEEP

      12288:Lv1H9GM9a/rHC60G4T/+CRz9hBXtB8kPC9xrOMe7BG/MEEbbt27QkMQAp0R/QCAH:LvJ45/2XG4hXXnSadaruwddZvGcfN/vw

    • Detected phishing page

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks