General

  • Target

    0f1502b9e88b65a84347da4c922933f7c8b8c2436d1d850f8f923bdb259d4bd3

  • Size

    716KB

  • Sample

    221125-vk8k2sbh43

  • MD5

    925d83f35c3f88ca7523723e2c8c85e0

  • SHA1

    faee021043c5b09704e692eb7aaeb21301c70b9d

  • SHA256

    0f1502b9e88b65a84347da4c922933f7c8b8c2436d1d850f8f923bdb259d4bd3

  • SHA512

    5a8f3ac798140ca5119ed416559649f0272b9f9482db1679d9f0fe4bc7826884818b917bb920f50e25e06ba58fd70bd84f4e95b5aad1d351cf6c2e7288a3b923

  • SSDEEP

    12288:S2Zw/eTW0JYVFBgcX9jCVBBQExGI7/WOpNrDRnHEWupTyOtq/RuGOWgj:tW/eTWdEyjEBBQ6WENnRkWupTSZz+

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ebuka6733

Targets

    • Target

      0f1502b9e88b65a84347da4c922933f7c8b8c2436d1d850f8f923bdb259d4bd3

    • Size

      716KB

    • MD5

      925d83f35c3f88ca7523723e2c8c85e0

    • SHA1

      faee021043c5b09704e692eb7aaeb21301c70b9d

    • SHA256

      0f1502b9e88b65a84347da4c922933f7c8b8c2436d1d850f8f923bdb259d4bd3

    • SHA512

      5a8f3ac798140ca5119ed416559649f0272b9f9482db1679d9f0fe4bc7826884818b917bb920f50e25e06ba58fd70bd84f4e95b5aad1d351cf6c2e7288a3b923

    • SSDEEP

      12288:S2Zw/eTW0JYVFBgcX9jCVBBQExGI7/WOpNrDRnHEWupTyOtq/RuGOWgj:tW/eTWdEyjEBBQ6WENnRkWupTSZz+

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks