General

  • Target

    75dd0717eedd8738dc43283d2e2b172939fc68e517f90c9ed849a4b57799dbd3

  • Size

    3.0MB

  • Sample

    221128-e2kmjsee68

  • MD5

    8d95316ec6a0638d97ae0a37b402776b

  • SHA1

    9db970f50d1ba8c27e7fd3cefdd93af8a810c67e

  • SHA256

    75dd0717eedd8738dc43283d2e2b172939fc68e517f90c9ed849a4b57799dbd3

  • SHA512

    99d79073f9d6f4f76ffa139d220cff9aa3fef042f022226166e55acdb588eec4c71d0467865ac34748be32c8c6c07d3e3957a5defde4cb5a501fd1ed601a085b

  • SSDEEP

    49152:OK3dAkXQM3YcSJS1oh0Qei+9wjfTSKJ0wFe3RSTsG41dzEGywRDcXUCGajWsCqx+:OK3dAEf3sjhRF+6fT/be8Tf4NhCGT

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.freehostia.com
  • Port:
    21
  • Username:
    benowe4
  • Password:
    jerry003

Targets

    • Target

      75dd0717eedd8738dc43283d2e2b172939fc68e517f90c9ed849a4b57799dbd3

    • Size

      3.0MB

    • MD5

      8d95316ec6a0638d97ae0a37b402776b

    • SHA1

      9db970f50d1ba8c27e7fd3cefdd93af8a810c67e

    • SHA256

      75dd0717eedd8738dc43283d2e2b172939fc68e517f90c9ed849a4b57799dbd3

    • SHA512

      99d79073f9d6f4f76ffa139d220cff9aa3fef042f022226166e55acdb588eec4c71d0467865ac34748be32c8c6c07d3e3957a5defde4cb5a501fd1ed601a085b

    • SSDEEP

      49152:OK3dAkXQM3YcSJS1oh0Qei+9wjfTSKJ0wFe3RSTsG41dzEGywRDcXUCGajWsCqx+:OK3dAEf3sjhRF+6fT/be8Tf4NhCGT

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

2
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks