General

  • Target

    STATEMENT IN JUN 2023.zip

  • Size

    451KB

  • Sample

    230802-gkqtcada95

  • MD5

    527455ccafee117e97e3a6524816e2d0

  • SHA1

    7add1bb778e03b2aef86dca9602aeb946f46ea8b

  • SHA256

    a285da59a4bd7b27ff2c1c456dd2570d08ee0583e27f6daecb5ef8a7221420e9

  • SHA512

    332861240fc8d7992f2ff09a9f2b5e1421eef6085fbf98f7150665f72f5f9e2aa580014aa0bcad153112d417ba704b8fbbdd587e4e47fe8fa57493502709759a

  • SSDEEP

    12288:jGbC7FLrz5AQRLAJPsUIAEebngtI9wp/4Va:abgLn5LR0IjezgtIKP

Malware Config

Targets

    • Target

      STATEMENT IN JUN 2023.exe

    • Size

      742KB

    • MD5

      ab3a7089c3c5968977aebfa85fdc05cd

    • SHA1

      da9ca170ca878ba9b6c2b6b38c462491813edce0

    • SHA256

      2743a30069ac7bd06abed1ca7b5a867d034b3c0793d92eba2b91bce0e98f67f6

    • SHA512

      b8cd71c5a903c3e57b90b95e47b271a00a7a0fb5ebd3f3fe8db1705b55451c7e624e18c79c52ad6428b17ffcbbc97d27caabcd64ce3ef7448791fd9a5cbea0a0

    • SSDEEP

      12288:xRju+nO5ReCNLwJPqOIAEibVK1g9u3pppNpppppoOQpppNpppppoO:xA5RtNCIjiBK1gY3pppNpppppoOQpppv

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks