General

  • Target

    file.exe

  • Size

    1.8MB

  • Sample

    230609-kg1e6acd6v

  • MD5

    e34ad9a826aa56c04ce0f10c800b789f

  • SHA1

    2f54efb23d78e570a7b29195520ccf346d181ad2

  • SHA256

    4aa12984de37ac1fb650f1196e88fb5a64707e571382d641e1c70ce82e89cf0a

  • SHA512

    951650d5d7ea77360efd1b81e8e1dd8ff06dc1e085053c019997ab7941aacfd15a1a07070c8d2428fca6304f3aceb91625b387d42a474931891e600caab8bcba

  • SSDEEP

    49152:4m764jXzDNyW+Raj6uegFMSmigqz/V3I0b0jZo1/IrDanQOgHpYbftTJ0TCoGvRi:4m764jXzDNyW+Raj6uegFMSfz/Fb0lo8

Malware Config

Targets

    • Target

      file.exe

    • Size

      1.8MB

    • MD5

      e34ad9a826aa56c04ce0f10c800b789f

    • SHA1

      2f54efb23d78e570a7b29195520ccf346d181ad2

    • SHA256

      4aa12984de37ac1fb650f1196e88fb5a64707e571382d641e1c70ce82e89cf0a

    • SHA512

      951650d5d7ea77360efd1b81e8e1dd8ff06dc1e085053c019997ab7941aacfd15a1a07070c8d2428fca6304f3aceb91625b387d42a474931891e600caab8bcba

    • SSDEEP

      49152:4m764jXzDNyW+Raj6uegFMSmigqz/V3I0b0jZo1/IrDanQOgHpYbftTJ0TCoGvRi:4m764jXzDNyW+Raj6uegFMSfz/Fb0lo8

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks