General

  • Target

    Shipping Docs pdf.exe

  • Size

    266KB

  • Sample

    230130-k17ctahh27

  • MD5

    03e1fdc9b2e22e3f8aa407f5cca72988

  • SHA1

    22083343cd363eabcdda32951e05469944a5d5f9

  • SHA256

    5b9526189de8e65081bfbd32b6e4a21589148552deefd27aaa9644410462d732

  • SHA512

    84b22503c7b771c61c71e538126f74e7ba8b646b153203e95ef088e2ad805c49dd2c1928b29886baa7a2262d51613fb2eeb4a1e288f623e91380da6a8753b0f8

  • SSDEEP

    6144:/Ya6ncYkxfXeEWlK4rzDDLbj7CQf7npHCBFcDx:/YVcYkhQK4rz/Df7kBEx

Malware Config

Targets

    • Target

      Shipping Docs pdf.exe

    • Size

      266KB

    • MD5

      03e1fdc9b2e22e3f8aa407f5cca72988

    • SHA1

      22083343cd363eabcdda32951e05469944a5d5f9

    • SHA256

      5b9526189de8e65081bfbd32b6e4a21589148552deefd27aaa9644410462d732

    • SHA512

      84b22503c7b771c61c71e538126f74e7ba8b646b153203e95ef088e2ad805c49dd2c1928b29886baa7a2262d51613fb2eeb4a1e288f623e91380da6a8753b0f8

    • SSDEEP

      6144:/Ya6ncYkxfXeEWlK4rzDDLbj7CQf7npHCBFcDx:/YVcYkhQK4rz/Df7kBEx

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks