General

  • Target

    492f3ba9a27325ee5f5a5aca19fb181e868797df58976b7df493e889b28072b9

  • Size

    139KB

  • Sample

    221201-q8pevsea92

  • MD5

    cea22aa8e58db2653d4c7859849bf908

  • SHA1

    72468a059aaf4f5df54379789eaa07468807834f

  • SHA256

    492f3ba9a27325ee5f5a5aca19fb181e868797df58976b7df493e889b28072b9

  • SHA512

    4b64d2902ec2f397dbc00e7bb25a29e09580c9effb5791d8aaf3e36f24642ac67cb576c828cb393003834bd193a3bcc2d129aee06addb729ede9a823e24179fd

  • SSDEEP

    3072:ovjCjYbxolw+B8eI4776R+8IcBVVgIo1Z6yTJ4mXzu78:t4IcBoNZG

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtps.uol.com.br
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    frd2008

Targets

    • Target

      492f3ba9a27325ee5f5a5aca19fb181e868797df58976b7df493e889b28072b9

    • Size

      139KB

    • MD5

      cea22aa8e58db2653d4c7859849bf908

    • SHA1

      72468a059aaf4f5df54379789eaa07468807834f

    • SHA256

      492f3ba9a27325ee5f5a5aca19fb181e868797df58976b7df493e889b28072b9

    • SHA512

      4b64d2902ec2f397dbc00e7bb25a29e09580c9effb5791d8aaf3e36f24642ac67cb576c828cb393003834bd193a3bcc2d129aee06addb729ede9a823e24179fd

    • SSDEEP

      3072:ovjCjYbxolw+B8eI4776R+8IcBVVgIo1Z6yTJ4mXzu78:t4IcBoNZG

    Score
    10/10
    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix

Tasks