General

  • Target

    file.exe

  • Size

    3.5MB

  • Sample

    230109-pdqtrsea97

  • MD5

    3b6fb042e6367d2236cf446a3b6e682a

  • SHA1

    073b614e9bfc20dcd2561a41b2b71d55d8fef97a

  • SHA256

    039f369111d05c1b9374795eeec77003832b896132123554296d4718fc77384d

  • SHA512

    ffd58aec93cddf8d9017e51d5f1eeee1d67a8b5dc44e1cf6ee9fc7f812ea0f6c85cb94f1803242107666ec5d9dd9bf75a72450a6b199eeeecdc6f90f702ac2f1

  • SSDEEP

    98304:d0Ez8W2/pAF92yg8rYSNdoo/YlL0iPgUOzgHJ7P7CbM5zD6sILTjblMS0u:Co/Xiskpi4osI3jhMSN

Malware Config

Targets

    • Target

      file.exe

    • Size

      3.5MB

    • MD5

      3b6fb042e6367d2236cf446a3b6e682a

    • SHA1

      073b614e9bfc20dcd2561a41b2b71d55d8fef97a

    • SHA256

      039f369111d05c1b9374795eeec77003832b896132123554296d4718fc77384d

    • SHA512

      ffd58aec93cddf8d9017e51d5f1eeee1d67a8b5dc44e1cf6ee9fc7f812ea0f6c85cb94f1803242107666ec5d9dd9bf75a72450a6b199eeeecdc6f90f702ac2f1

    • SSDEEP

      98304:d0Ez8W2/pAF92yg8rYSNdoo/YlL0iPgUOzgHJ7P7CbM5zD6sILTjblMS0u:Co/Xiskpi4osI3jhMSN

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks