General

  • Target

    051759e71d363fbc702a53822b5bdb06685aa694ab333d8301f64caa71251423

  • Size

    3.7MB

  • Sample

    230214-ac48fagf81

  • MD5

    bdc4e48ab77da70df339251dd9593469

  • SHA1

    40430bdd01f985136cb9fb098dd1284b2f32ad30

  • SHA256

    051759e71d363fbc702a53822b5bdb06685aa694ab333d8301f64caa71251423

  • SHA512

    eaa9ea17e9129a8fcc2ff7bd19b2e235a0504ab5887f6b3377f7397954f4ad47f838d1bac188bf36888b10c9b7495fa78215b3d9d0b9b1cee0a76ba5078aa021

  • SSDEEP

    98304:Du30dtnWysYETLBJqzMJgsjG/tH9LBMx1T0vr0CMFd:yqWymLiExwtHdnvIC

Malware Config

Targets

    • Target

      051759e71d363fbc702a53822b5bdb06685aa694ab333d8301f64caa71251423

    • Size

      3.7MB

    • MD5

      bdc4e48ab77da70df339251dd9593469

    • SHA1

      40430bdd01f985136cb9fb098dd1284b2f32ad30

    • SHA256

      051759e71d363fbc702a53822b5bdb06685aa694ab333d8301f64caa71251423

    • SHA512

      eaa9ea17e9129a8fcc2ff7bd19b2e235a0504ab5887f6b3377f7397954f4ad47f838d1bac188bf36888b10c9b7495fa78215b3d9d0b9b1cee0a76ba5078aa021

    • SSDEEP

      98304:Du30dtnWysYETLBJqzMJgsjG/tH9LBMx1T0vr0CMFd:yqWymLiExwtHdnvIC

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks