General

  • Target

    file.exe

  • Size

    4.0MB

  • Sample

    230608-y69l1sag51

  • MD5

    27b17d2159cb2d376643dd6ecdd01224

  • SHA1

    05d53771c76bf429ca338c4baed199152d714ce4

  • SHA256

    625ab7856c3c34a7be37ae4d7cc640a775dbea37bf5e81c0716de2d80aadfc04

  • SHA512

    9c8477a063afee5e583f564c7e4b584e2c38474b4c5e31bbaa3eaa9e26bfd742ca85960bf5199d2f9b1a42da27265486038e0bc87bae6dab6cb57d8d2090defb

  • SSDEEP

    98304:Rp4/OosDaj0aK9xjcpzxoUVKz/PD091ky+6yq/vXX7P7CbXIKc5zD6sILTjblMSN:Jz/W1kBefiLIKcosI3jhMSN

Malware Config

Targets

    • Target

      file.exe

    • Size

      4.0MB

    • MD5

      27b17d2159cb2d376643dd6ecdd01224

    • SHA1

      05d53771c76bf429ca338c4baed199152d714ce4

    • SHA256

      625ab7856c3c34a7be37ae4d7cc640a775dbea37bf5e81c0716de2d80aadfc04

    • SHA512

      9c8477a063afee5e583f564c7e4b584e2c38474b4c5e31bbaa3eaa9e26bfd742ca85960bf5199d2f9b1a42da27265486038e0bc87bae6dab6cb57d8d2090defb

    • SSDEEP

      98304:Rp4/OosDaj0aK9xjcpzxoUVKz/PD091ky+6yq/vXX7P7CbXIKc5zD6sILTjblMSN:Jz/W1kBefiLIKcosI3jhMSN

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks