General

  • Target

    ac9d0e0c018a18cbd124a9dbe15fb459b2eee487dc94ecb7a5cb837814e0121a

  • Size

    649KB

  • Sample

    221128-l77slaeg93

  • MD5

    1e4a6d06e5ef4cdc5e1dd0c35549edde

  • SHA1

    d14ae51529a60c7a387c89568e3fddb0a8ce39dc

  • SHA256

    ac9d0e0c018a18cbd124a9dbe15fb459b2eee487dc94ecb7a5cb837814e0121a

  • SHA512

    6b9144bece8265d718d2afdc165d0b950b00f2e419f265a8485a9836b5c3f972236599ed74a4d3f620aca0c35c10a46c8c1c9db70af37431815b018fc45594c3

  • SSDEEP

    12288:BoAc2a7FSKDvKbBwuBIE+6TwBoMGYd18iu89WBw6osMs+0i+K5h:BoAc23M8SFXtu8sNosod5h

Malware Config

Targets

    • Target

      ac9d0e0c018a18cbd124a9dbe15fb459b2eee487dc94ecb7a5cb837814e0121a

    • Size

      649KB

    • MD5

      1e4a6d06e5ef4cdc5e1dd0c35549edde

    • SHA1

      d14ae51529a60c7a387c89568e3fddb0a8ce39dc

    • SHA256

      ac9d0e0c018a18cbd124a9dbe15fb459b2eee487dc94ecb7a5cb837814e0121a

    • SHA512

      6b9144bece8265d718d2afdc165d0b950b00f2e419f265a8485a9836b5c3f972236599ed74a4d3f620aca0c35c10a46c8c1c9db70af37431815b018fc45594c3

    • SSDEEP

      12288:BoAc2a7FSKDvKbBwuBIE+6TwBoMGYd18iu89WBw6osMs+0i+K5h:BoAc23M8SFXtu8sNosod5h

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks