General

  • Target

    SecuriteInfo.com.W32.MSIL_Kryptik.DWR.gen.Eldorado.16852.14916.exe

  • Size

    620KB

  • Sample

    230112-jep1zabc5s

  • MD5

    39aa6f0be59dff4ecc239594928b4c91

  • SHA1

    762b89b976113244dee1681f6c64dd4147366556

  • SHA256

    f76fef3e72be648d3a32fb43e48276ef6f04cc0f5a21b89d58983c3232775adc

  • SHA512

    5c23d5968b12e89a2394c87abd32cbca17648c3948a7859e3d56a325c223e588b5fac3b3c2d8f266504eb09f85a1572bb55fbcde45bb2a875da5fb683ea89faf

  • SSDEEP

    12288:MofCDolfhIk0SUbpEgOIDvdWyu4mTxSq3j+BrliJ7t:iO0SUbprHxu4Wp3Klipt

Malware Config

Targets

    • Target

      SecuriteInfo.com.W32.MSIL_Kryptik.DWR.gen.Eldorado.16852.14916.exe

    • Size

      620KB

    • MD5

      39aa6f0be59dff4ecc239594928b4c91

    • SHA1

      762b89b976113244dee1681f6c64dd4147366556

    • SHA256

      f76fef3e72be648d3a32fb43e48276ef6f04cc0f5a21b89d58983c3232775adc

    • SHA512

      5c23d5968b12e89a2394c87abd32cbca17648c3948a7859e3d56a325c223e588b5fac3b3c2d8f266504eb09f85a1572bb55fbcde45bb2a875da5fb683ea89faf

    • SSDEEP

      12288:MofCDolfhIk0SUbpEgOIDvdWyu4mTxSq3j+BrliJ7t:iO0SUbprHxu4Wp3Klipt

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks