General

  • Target

    3316b2062ba9b531cbf971d22ca433b7.bin

  • Size

    589KB

  • Sample

    230816-bngf7aec28

  • MD5

    e88630290ad9d177cbaf7899206d4d79

  • SHA1

    e2503e35c9c4a1835bca7e30820cba3d979eb662

  • SHA256

    ca9a3bb72a83c1cb429ac74bdcd803b36653e4edf5f56355afc28fdc29542e16

  • SHA512

    a20e029fa388700882ba1bfd8fd8955b58c1f8749092d1f01970ef029ee0b150743860f1deb3af3e48908215d9d264329bce9d46e0c564316b4d7166a1afa2ee

  • SSDEEP

    12288:y/K8O+X4rNhCRmBWXJkJiLd4mTKQDOGAtpR8xbgkT/RKOeb6w0OwlGTDP:y/VO+XM/lY+gL5Txc8nUOeb6wBKGTDP

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.hengshlusa.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ASH#898usbj

Targets

    • Target

      c0d4dfab211b00bc04b0ef763548fe9cd5d0ab7330546875ef1e29adcf33f800.exe

    • Size

      678KB

    • MD5

      3316b2062ba9b531cbf971d22ca433b7

    • SHA1

      2b4fa70e808a2e2324867dceacfe67708bea89c8

    • SHA256

      c0d4dfab211b00bc04b0ef763548fe9cd5d0ab7330546875ef1e29adcf33f800

    • SHA512

      8a18544f07196fd5d08c8046f5f65b7fe01d3fae1794148980f0d11547ebbd4491d47931fb2977f4a2013526860f54424fd380b44a265af65d76f45033d1dc82

    • SSDEEP

      12288:1l9af4lrryEtbeTURKQkGmTBUhydYImC3Qk6SIFxViiygLn:T9e4lXy8YURKHUAY7C3Qk6SA

    Score
    10/10
    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks