General

  • Target

    677809.exe

  • Size

    541KB

  • Sample

    230111-pwrh1sca76

  • MD5

    7416af0e6dbe13b36bdfe2e609b00666

  • SHA1

    5958c7eb0d93510ff00241c7257d7026c207c7e8

  • SHA256

    25483a164b2ab3cb283f494f2022793b99595bbf3af41b0620dcd3b0d3d612be

  • SHA512

    e29221074b0c84d093a6b0e70d9912a5300a7fc2f9c096ecaff07d282dfe85f656c6fb6f1b02e5873be42e23aac6abb7032b159add757bd188c6abd3547ecda1

  • SSDEEP

    12288:oY+ojsYcfslV1Px6E4ZNmnh6rzYk9Lbfd5vS9/TRTA:oY9sYcfslV1slZqhRkBbV5voVk

Malware Config

Targets

    • Target

      677809.exe

    • Size

      541KB

    • MD5

      7416af0e6dbe13b36bdfe2e609b00666

    • SHA1

      5958c7eb0d93510ff00241c7257d7026c207c7e8

    • SHA256

      25483a164b2ab3cb283f494f2022793b99595bbf3af41b0620dcd3b0d3d612be

    • SHA512

      e29221074b0c84d093a6b0e70d9912a5300a7fc2f9c096ecaff07d282dfe85f656c6fb6f1b02e5873be42e23aac6abb7032b159add757bd188c6abd3547ecda1

    • SSDEEP

      12288:oY+ojsYcfslV1Px6E4ZNmnh6rzYk9Lbfd5vS9/TRTA:oY9sYcfslV1slZqhRkBbV5voVk

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks