General

  • Target

    RFQ - 3 x pallets - 1075kg - 1.861 CBM.exe

  • Size

    893KB

  • Sample

    230126-qc774adf82

  • MD5

    83a9ff44ae1051c7c3f99938556239c3

  • SHA1

    c90cdd4afa60a64856aecc177602a33b0c1fb5f4

  • SHA256

    c94fc73c5fcad1ab614fba37d9cc9c21f328c4787e39f3e3d673e1c408691434

  • SHA512

    df683b09efb99b47c011d4ec00d9029ecc0e970c564610f04ff6d7138109d97c24783943927c5304527ae8c570b6c542850dc637600dabd75178f3512d008fae

  • SSDEEP

    12288:FtG7vV5zxPCRgzCWWoXDDFqIGYMyiA2gqbEP03711m8Z5KMMnDfS4nqU4/Wz4A:J6GYMyiA2gqz37P72bnJqVWz4A

Malware Config

Targets

    • Target

      RFQ - 3 x pallets - 1075kg - 1.861 CBM.exe

    • Size

      893KB

    • MD5

      83a9ff44ae1051c7c3f99938556239c3

    • SHA1

      c90cdd4afa60a64856aecc177602a33b0c1fb5f4

    • SHA256

      c94fc73c5fcad1ab614fba37d9cc9c21f328c4787e39f3e3d673e1c408691434

    • SHA512

      df683b09efb99b47c011d4ec00d9029ecc0e970c564610f04ff6d7138109d97c24783943927c5304527ae8c570b6c542850dc637600dabd75178f3512d008fae

    • SSDEEP

      12288:FtG7vV5zxPCRgzCWWoXDDFqIGYMyiA2gqbEP03711m8Z5KMMnDfS4nqU4/Wz4A:J6GYMyiA2gqz37P72bnJqVWz4A

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks