General

  • Target

    ZvfonBmhKpliJRP.exe

  • Size

    681KB

  • Sample

    230130-rggflscd21

  • MD5

    bfd342f0fe5a471979b477b58c2c4547

  • SHA1

    8758109d8a41ffc3d29cb7f59f8eba73b0e7aea4

  • SHA256

    f40cfff9e68afadb4fa6ee0614379bbf32441c824a6b2244c202247c246201a5

  • SHA512

    c7d4e9f324b49a93ae01ecc7d3112093c16ca5a55ce099bb9d7adad8ee1540edd15282dfe84c8b3345926ad48d8a6021bdc04f2da6cedd8e1d456a142e4385b3

  • SSDEEP

    12288:0MyBFjCfuXdm4S4w1gzs4ljxs899NGkPWT8z4ETWxO8R9BDMI:WXYwx9s89HGcNQB

Malware Config

Targets

    • Target

      ZvfonBmhKpliJRP.exe

    • Size

      681KB

    • MD5

      bfd342f0fe5a471979b477b58c2c4547

    • SHA1

      8758109d8a41ffc3d29cb7f59f8eba73b0e7aea4

    • SHA256

      f40cfff9e68afadb4fa6ee0614379bbf32441c824a6b2244c202247c246201a5

    • SHA512

      c7d4e9f324b49a93ae01ecc7d3112093c16ca5a55ce099bb9d7adad8ee1540edd15282dfe84c8b3345926ad48d8a6021bdc04f2da6cedd8e1d456a142e4385b3

    • SSDEEP

      12288:0MyBFjCfuXdm4S4w1gzs4ljxs899NGkPWT8z4ETWxO8R9BDMI:WXYwx9s89HGcNQB

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks