General

  • Target

    shipping document.iso

  • Size

    730KB

  • Sample

    230206-v72q1sac91

  • MD5

    e9c57b08c7096a87b63edf8a0679544e

  • SHA1

    8abf5444791800906c5e58c756404011fdd9d8de

  • SHA256

    034fef494be1b89dc427f9b06a4e8daed7a62070aff5c3f39a5f936fd512a62b

  • SHA512

    d1b7d64a747912e6a007880bf536c30f64e5dfa61bacada537b605f22b9e2b1b47b7f54562343a1be97bcdaff3018631d187606dda114126845b6f60a6627643

  • SSDEEP

    12288:y/O+tpuYpDKxFUsPlr34IlcBwdVo4R++JeUfF+rZEA7pKpiCwELySdVKvNQPHl:P3F9lroIlcBOd9eUfF+N8pXw9SHik

Score
7/10

Malware Config

Targets

    • Target

      shipping document.exe

    • Size

      670KB

    • MD5

      5b24a676b61fa02b1778a19c3f11226d

    • SHA1

      5c5b3ec80e47691720275965552b6eab03c0f1da

    • SHA256

      d5b490c5f0f035c7b2b45fcb1c62a6ba66dedf3cbbaa5e678cace9537d89b35b

    • SHA512

      6d7cb883f0ab946d9463c16b50aa7d403f34d7a02a64ef167ad1743c007e3918c57ddd42b61ce961a9e9ecfa6847c852c53102ad652c99c833b9a5b71068b032

    • SSDEEP

      12288:n/O+tpuYpDKxFUsPlr34IlcBwdVo4R++JeUfF+rZEA7pKpiCwELySdVKvNQPHl:m3F9lroIlcBOd9eUfF+N8pXw9SHik

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks