General

  • Target

    download.exe

  • Size

    338KB

  • Sample

    230508-rvpzxach3w

  • MD5

    38e58f13850cc52dc3416b6020e93177

  • SHA1

    3df1acd75d778378a46e25212d441380ed704083

  • SHA256

    8c307fced5146d81f7ec8c083337d3c7e8a92ff09a05ac20bc4b4efea7826821

  • SHA512

    a016c07abe1cc34550a3fb3c6423ac19e943c6e24f7cb093f65bed9772bb21de25feb8f1c06722fbdb88152efff71b9b77cc33e8dbf46efd97fee8930e0505f4

  • SSDEEP

    6144:BlyoEbgxi/j+vgVzinY77o9TBaCViMNErE4ConoFkHjIlBFNeYTtrUIr4vheOZP:PyoEw4+oVziucTBJ4mE1Conw8jITLzU

Malware Config

Targets

    • Target

      download.exe

    • Size

      338KB

    • MD5

      38e58f13850cc52dc3416b6020e93177

    • SHA1

      3df1acd75d778378a46e25212d441380ed704083

    • SHA256

      8c307fced5146d81f7ec8c083337d3c7e8a92ff09a05ac20bc4b4efea7826821

    • SHA512

      a016c07abe1cc34550a3fb3c6423ac19e943c6e24f7cb093f65bed9772bb21de25feb8f1c06722fbdb88152efff71b9b77cc33e8dbf46efd97fee8930e0505f4

    • SSDEEP

      6144:BlyoEbgxi/j+vgVzinY77o9TBaCViMNErE4ConoFkHjIlBFNeYTtrUIr4vheOZP:PyoEw4+oVziucTBJ4mE1Conw8jITLzU

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks