General

  • Target

    NO. USF23-24072 IGR23110.zip

  • Size

    653KB

  • Sample

    230802-gkqhkseb3z

  • MD5

    ed470d697622053cac541f1ccca3ae67

  • SHA1

    83cc4d4654352482e8d0f20302934d155bdf559c

  • SHA256

    40756cb5af00d5acb4938d6579432718053a54ecb682145a91bc1ebd94efc002

  • SHA512

    7f0d994ed6e11d37d4efae6b9c9db06ed86d81d211a8d3b7552ed291113274a31a4e0083b263a8408c5620c6dd715fae119ceaf09193b7d5dde53100d34751f8

  • SSDEEP

    12288:Qq22vBr8nMomzBgi7+4aHbEuHGzK1ahM5bh5YOx95birPQedb5j:hBr8OeiMHbEuZQunYOx9RCPQyb5j

Malware Config

Targets

    • Target

      NO. USF23-24072 IGR23110.exe

    • Size

      723KB

    • MD5

      0587a993230426466fc857bb7889e513

    • SHA1

      4787a7076b321400666463a89a5c5233b93c6262

    • SHA256

      e949856ccd8b9d36fb7c2322f2c09d2a969c0121c9b08361cf16dc08c316d3ad

    • SHA512

      78db92623daf346fefabe9280f9016760fba16af2bb8682cdc5feac6361a2f0b216ea4f86dd24e91290d16e504431458afa6382741346678aa63f8799ac1dcc3

    • SSDEEP

      12288:H+uZndSYmJ+37YZaB7G64qY7+4sFlp13yDoh2rj5bhpYOR95R675hmjYJ:H+uNdSYmQ37YZaECYi91CDoM1rYOR9LY

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks