General

  • Target

    qW8M5HSy.exe

  • Size

    1KB

  • Sample

    230701-j3v7wsgb83

  • MD5

    46b44392c9693a9754b03fd87d7ae625

  • SHA1

    4ef82030802e3872564be8d399108826d45cc757

  • SHA256

    1e9908eba3da4476e637db3f86365aa0b339ca9b6f203187f922b354d8c99925

  • SHA512

    ae4ff7faa5c15b586da1c6adc656e420a6a8f4fc9e1deecfa91f4270561edb555b037a4fb5d548664a3e9352bc98e22dc773410611a4489280f284fd1268f6c3

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    root1234!

Targets

    • Target

      qW8M5HSy.exe

    • Size

      1KB

    • MD5

      46b44392c9693a9754b03fd87d7ae625

    • SHA1

      4ef82030802e3872564be8d399108826d45cc757

    • SHA256

      1e9908eba3da4476e637db3f86365aa0b339ca9b6f203187f922b354d8c99925

    • SHA512

      ae4ff7faa5c15b586da1c6adc656e420a6a8f4fc9e1deecfa91f4270561edb555b037a4fb5d548664a3e9352bc98e22dc773410611a4489280f284fd1268f6c3

    Score
    10/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks