General

  • Target

    Payment_Swift_image001_18.08.2023.pdf.exe

  • Size

    687KB

  • Sample

    230818-qbhk2sbb6v

  • MD5

    3c69c2def3695bc1a6581eeea62fe8e7

  • SHA1

    001b3af50a017337a86cbb7d4d999f3a267f2142

  • SHA256

    84e5beb64edd5d86e524efa857995b09d5f5f2d7e5effc974e4dfb4e4d5364ed

  • SHA512

    9bf39628f917cd9b23e14bd67ac4752c43f3814de07d0f5d57c3317a3b10fa82c0a7722d15a5808d005202fd9a67904f14a060bbdb2030b4d4850c41bf495dce

  • SSDEEP

    12288:75mHFFDUSbEkbwcuaDOWcruep144kPCXf5Y3fD070:NmX3Ej+OWclpdBOC

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.asainsaatmakina.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    asa2021

Targets

    • Target

      Payment_Swift_image001_18.08.2023.pdf.exe

    • Size

      687KB

    • MD5

      3c69c2def3695bc1a6581eeea62fe8e7

    • SHA1

      001b3af50a017337a86cbb7d4d999f3a267f2142

    • SHA256

      84e5beb64edd5d86e524efa857995b09d5f5f2d7e5effc974e4dfb4e4d5364ed

    • SHA512

      9bf39628f917cd9b23e14bd67ac4752c43f3814de07d0f5d57c3317a3b10fa82c0a7722d15a5808d005202fd9a67904f14a060bbdb2030b4d4850c41bf495dce

    • SSDEEP

      12288:75mHFFDUSbEkbwcuaDOWcruep144kPCXf5Y3fD070:NmX3Ej+OWclpdBOC

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks