General

  • Target

    9db14699ff0f8d42d946bbd633f2bfb7adde78fe3efb5585046f4e967a7dbbb7

  • Size

    156KB

  • Sample

    221202-wafmyshg88

  • MD5

    467b4da232c32399ac7dd1c878e8d513

  • SHA1

    c481093e391ba3603f29927e589ed946da5a83f4

  • SHA256

    9db14699ff0f8d42d946bbd633f2bfb7adde78fe3efb5585046f4e967a7dbbb7

  • SHA512

    c868447bdbe9bd9247ebc814f479fb8db6fb776a488cd1df45072672f705935003e95ea3754ead991d49a4ed107bc8bb1eae034fd60471203ee05a04db1058ce

  • SSDEEP

    3072:AHi5F65ueJ5Xaa0pxPznruTmAMJBhC3A3Bg:AVfXafznrYMJk0B

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    Smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    kolokol000

Targets

    • Target

      9db14699ff0f8d42d946bbd633f2bfb7adde78fe3efb5585046f4e967a7dbbb7

    • Size

      156KB

    • MD5

      467b4da232c32399ac7dd1c878e8d513

    • SHA1

      c481093e391ba3603f29927e589ed946da5a83f4

    • SHA256

      9db14699ff0f8d42d946bbd633f2bfb7adde78fe3efb5585046f4e967a7dbbb7

    • SHA512

      c868447bdbe9bd9247ebc814f479fb8db6fb776a488cd1df45072672f705935003e95ea3754ead991d49a4ed107bc8bb1eae034fd60471203ee05a04db1058ce

    • SSDEEP

      3072:AHi5F65ueJ5Xaa0pxPznruTmAMJBhC3A3Bg:AVfXafznrYMJk0B

    Score
    10/10
    • Drops file in Drivers directory

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks