General

  • Target

    26902439b97a49f43343f56542ccd022.bin

  • Size

    697KB

  • Sample

    230722-bgwyashc83

  • MD5

    23cfbe50ea0246e637f62a84d4933269

  • SHA1

    2cb0b44fc38ba4549798e1a025f7df6c3c1217a7

  • SHA256

    22dcfff3b9bee6f90db191f9b936ee81bdd1b69e6da87bd13c7de3769754df42

  • SHA512

    eadfcb1e809048b11514169e40df988f59cc0f6a37cf3c497767c59c709c1487e467a74a3c6fd5d6589f7a705f13a6406ddfd1adf47c37c9c7cdca6fe61a28f8

  • SSDEEP

    12288:u2jiqbc8Otx537W4KS99HYSqJg0hShzvZaH22yaCdraeJ5Jrar9vdBoynbFml24f:Niqbcdta4nHYzwhzMHr1ChGhdZm0O

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.lafer.mx
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ok)Q!)N7

Targets

    • Target

      7a9219fbe2409d6080f9853798e178538b6f58669d94fa4346efae44e7478869.exe

    • Size

      779KB

    • MD5

      26902439b97a49f43343f56542ccd022

    • SHA1

      62c8627231ee0197fa6c1340480ff9ce86433dec

    • SHA256

      7a9219fbe2409d6080f9853798e178538b6f58669d94fa4346efae44e7478869

    • SHA512

      8695ae0fdd4fee035c5d6b5339d7ea0be201d9f3119922fabfb66f226f844773ab464834791baf27c97ef10ec734458c77fa6a7d56126e77516b2c4b431ff951

    • SSDEEP

      24576:+2ATdCjEQPPymw6h4coQW0z+DVPqGZXU:+b5CAQPR49QW0+Ds

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks