General

  • Target

    Zahlung,jpg.exe

  • Size

    899KB

  • Sample

    230201-hexv5scb93

  • MD5

    aa72afc6fdca3aff5043694f61c54510

  • SHA1

    01e334b719d0735e9fa27b227068ea6d8f07d021

  • SHA256

    d9117ba98a0abf65bd92272205ee3371dab1f2ad9bbd80d21107b4259697831e

  • SHA512

    065754accdd145a07f9971ac0e23dd348905eae5536b61f2be3a4313846088d45f22dee0af0fbff271e99a753d0596fcbabd2c07e65a666a03a02d9b9e2dea49

  • SSDEEP

    12288:+ZflYWr87728fM/f6RSabB2RiTh3DTUYX+IJNCNJ9i7+pv7c4N34iDstW7RQxK6R:kflYWr8BMX6R5N8CzTAJw6R7c4N34V

Malware Config

Targets

    • Target

      Zahlung,jpg.exe

    • Size

      899KB

    • MD5

      aa72afc6fdca3aff5043694f61c54510

    • SHA1

      01e334b719d0735e9fa27b227068ea6d8f07d021

    • SHA256

      d9117ba98a0abf65bd92272205ee3371dab1f2ad9bbd80d21107b4259697831e

    • SHA512

      065754accdd145a07f9971ac0e23dd348905eae5536b61f2be3a4313846088d45f22dee0af0fbff271e99a753d0596fcbabd2c07e65a666a03a02d9b9e2dea49

    • SSDEEP

      12288:+ZflYWr87728fM/f6RSabB2RiTh3DTUYX+IJNCNJ9i7+pv7c4N34iDstW7RQxK6R:kflYWr8BMX6R5N8CzTAJw6R7c4N34V

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks