General

  • Target

    remittance020823.docx

  • Size

    11KB

  • Sample

    230802-g81nfsec4w

  • MD5

    fe809b4f9027a85b91f32935c8462a6d

  • SHA1

    0332116a7bd923f67696b8e0cd9d4ac1e8ecd0aa

  • SHA256

    3cfdf7ba4102e356819a52f06dfc23138def7b10b8338d6ac7e6ada986621b53

  • SHA512

    f1df5c5fd576a05950d8b8707e1e5bc622d23a6deff50479a26a2b524632d9a3f64a2372148c6718ddd0632af8883d7f5ff93023c5e519c9b168d279c91f28a1

  • SSDEEP

    192:oya0NksVeWG4N5eNA2A+EnVs+mg1SoBRWJYgO36PvJKAXtY9pcWecGWL7P:oyXksVeWGu5+A2bkBdB4JYgOqP9X+9pj

Score
8/10

Malware Config

Targets

    • Target

      remittance020823.docx

    • Size

      11KB

    • MD5

      fe809b4f9027a85b91f32935c8462a6d

    • SHA1

      0332116a7bd923f67696b8e0cd9d4ac1e8ecd0aa

    • SHA256

      3cfdf7ba4102e356819a52f06dfc23138def7b10b8338d6ac7e6ada986621b53

    • SHA512

      f1df5c5fd576a05950d8b8707e1e5bc622d23a6deff50479a26a2b524632d9a3f64a2372148c6718ddd0632af8883d7f5ff93023c5e519c9b168d279c91f28a1

    • SSDEEP

      192:oya0NksVeWG4N5eNA2A+EnVs+mg1SoBRWJYgO36PvJKAXtY9pcWecGWL7P:oyXksVeWGu5+A2bkBdB4JYgOqP9X+9pj

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks