General

  • Target

    shedor2.2.exe

  • Size

    337KB

  • Sample

    230111-s6hweahc4z

  • MD5

    2f536c946929c16c71d83f6e7dda1747

  • SHA1

    b178d72a97b8e4a43c3173465d8b6f16a6862309

  • SHA256

    d548bfcde55e09b8314b273b6fc1eff79563961b965cb83a763f4bb1b6c424ac

  • SHA512

    22656d8136209c119b73d594e272acb708181037085c9e79e1e7d194ec87ef48b5da49c7c82ec5def50091a2be585ef8456ae68fe4f36b9fc16ab5e01154787c

  • SSDEEP

    6144:mYa6mXMM4+mYDTuMjVFSMPVPwLzD92yVx+8bGKEAS/KdgCqE4bxMtJY:mYor4iDTuMjVFSMNIX4yVx+d5xCEbxM8

Malware Config

Targets

    • Target

      shedor2.2.exe

    • Size

      337KB

    • MD5

      2f536c946929c16c71d83f6e7dda1747

    • SHA1

      b178d72a97b8e4a43c3173465d8b6f16a6862309

    • SHA256

      d548bfcde55e09b8314b273b6fc1eff79563961b965cb83a763f4bb1b6c424ac

    • SHA512

      22656d8136209c119b73d594e272acb708181037085c9e79e1e7d194ec87ef48b5da49c7c82ec5def50091a2be585ef8456ae68fe4f36b9fc16ab5e01154787c

    • SSDEEP

      6144:mYa6mXMM4+mYDTuMjVFSMPVPwLzD92yVx+8bGKEAS/KdgCqE4bxMtJY:mYor4iDTuMjVFSMNIX4yVx+d5xCEbxM8

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks