General

  • Target

    PO H0001.zip

  • Size

    500KB

  • Sample

    230815-krdn5sbg5y

  • MD5

    b31ca7e113351804e0b55cd6f4a3beb7

  • SHA1

    c0ffe81d8a8b90768822f8a5c63191ebab8f97da

  • SHA256

    f4138806e15a620850c49a3ba7f5b558071f17f31df4fbc2b861499df6475d4b

  • SHA512

    9aca4b18850381774e9e2e717d9ac16645b8f8b0a61fc7a101f96e1d1659015add8274a0b7c2ee13542a975b4d6278c5807a9e3e6e4ba35f02a8d2117248f3d7

  • SSDEEP

    12288:7WbOqgaBBCy+EcceJZw7OGg2iaHHGmZPC2JmqlF2+N18Mb3LI9qEIFPe:CbOqg++DJCaGcmZaFCFNN18M3mB

Malware Config

Targets

    • Target

      PO H0001.exe

    • Size

      792KB

    • MD5

      0e842fe358b1b58b27f656e6a560a384

    • SHA1

      8d74628d62c52de01c5df2d663c87aedde613c71

    • SHA256

      b86b07dd168ae86bbfc16822df78793e8fbf52401673636047e8472fcd78ff26

    • SHA512

      84ec1bf1b7396b9ec6576a945fa825e578a6076c6b5aa3f2596af5461204590cd3dfe61e6780adea56137981cfd377f6456256f0f9e23cf7fcddc661c524e6fe

    • SSDEEP

      24576:ROguGvTGa60CZQPCFVNr8MxKRs6CE3jLMpppdpppppUO9Rs6CE3jLMpppdpppppb:vuuPV1QVNr8TRs6CE3jLbO9Rs6CE3jL6

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks