General

  • Target

    716b12ef929d94dda3d15bda1f857ecb5425c2f41861a959644fbc63cffb5a97

  • Size

    1.1MB

  • Sample

    221129-js8p8sae43

  • MD5

    020a43a3d665bd1773dbafd3846771d3

  • SHA1

    b8a069e92f31d8a47b0140de9e3aab9cf61c2f96

  • SHA256

    716b12ef929d94dda3d15bda1f857ecb5425c2f41861a959644fbc63cffb5a97

  • SHA512

    1ae550c5cd97faf2f329bf0788c2b67c2f0116a72f6032f290518f4c3336dbe3b7c8dbb3084dd7b3dc9591530b19d625a52f33ea679725a1958785cf98cc09c4

  • SSDEEP

    6144:FJ0pe/rN549WQATZk5T3/GNw6/oE7GGcvXzFTz4aGDJHGzGx37/G4yGQVS7W5gEW:0peB54/8

Malware Config

Targets

    • Target

      716b12ef929d94dda3d15bda1f857ecb5425c2f41861a959644fbc63cffb5a97

    • Size

      1.1MB

    • MD5

      020a43a3d665bd1773dbafd3846771d3

    • SHA1

      b8a069e92f31d8a47b0140de9e3aab9cf61c2f96

    • SHA256

      716b12ef929d94dda3d15bda1f857ecb5425c2f41861a959644fbc63cffb5a97

    • SHA512

      1ae550c5cd97faf2f329bf0788c2b67c2f0116a72f6032f290518f4c3336dbe3b7c8dbb3084dd7b3dc9591530b19d625a52f33ea679725a1958785cf98cc09c4

    • SSDEEP

      6144:FJ0pe/rN549WQATZk5T3/GNw6/oE7GGcvXzFTz4aGDJHGzGx37/G4yGQVS7W5gEW:0peB54/8

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks