General

  • Target

    7d2108216ed6e41a2eb8448f462f7d03e7ccab09

  • Size

    320KB

  • Sample

    230201-p9w1nadc75

  • MD5

    66d9be0911d76a81023425de72f109dc

  • SHA1

    7d2108216ed6e41a2eb8448f462f7d03e7ccab09

  • SHA256

    b6369635796fb8c318edbd1daa3d74816587157bf8b762c2d785ea7ccd10ad4c

  • SHA512

    7139c7e34e15d4d91f4f7f050f78142b2bd5efb257cc0ad670e0b521235d258c90be7ff93df84948936da99a9c0f1a0d54019fa22bc3dfc1b62d3afb4ff96ed3

  • SSDEEP

    6144:/Ya6jmEX6zkPvbjVRK45wtXrqUWmnWrY7JR2UoUOu05zWAFCFA:/YZmEX6avbj3KVtbVFRHz0ZWAoFA

Malware Config

Targets

    • Target

      7d2108216ed6e41a2eb8448f462f7d03e7ccab09

    • Size

      320KB

    • MD5

      66d9be0911d76a81023425de72f109dc

    • SHA1

      7d2108216ed6e41a2eb8448f462f7d03e7ccab09

    • SHA256

      b6369635796fb8c318edbd1daa3d74816587157bf8b762c2d785ea7ccd10ad4c

    • SHA512

      7139c7e34e15d4d91f4f7f050f78142b2bd5efb257cc0ad670e0b521235d258c90be7ff93df84948936da99a9c0f1a0d54019fa22bc3dfc1b62d3afb4ff96ed3

    • SSDEEP

      6144:/Ya6jmEX6zkPvbjVRK45wtXrqUWmnWrY7JR2UoUOu05zWAFCFA:/YZmEX6avbj3KVtbVFRHz0ZWAoFA

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks