General

  • Target

    4cf4f2da3b0b5148df4ee70b30009314a1b3a47dbec4607b5643c043a0582445_JC.exe

  • Size

    948KB

  • Sample

    230820-lhgj4sec28

  • MD5

    30eb517464cabd2db114e04ee21f78dc

  • SHA1

    054aaefcfc142b604f13e28e22f82aa869a17bc7

  • SHA256

    4cf4f2da3b0b5148df4ee70b30009314a1b3a47dbec4607b5643c043a0582445

  • SHA512

    4f39c54c2e3ecea88197e2fb0cfd4a09f621b113711caea6b74b3ee2079f5833db1277b02155092f193d5325fde533af74b1d69e97229ffc96838bed2f26decb

  • SSDEEP

    24576:bj4m9zPIvpppXpppppCOopppXpppppCOxJf2W+ANO8wumpTC5/Mpwxqv:IkISO/OWQA8PUlB

Malware Config

Targets

    • Target

      4cf4f2da3b0b5148df4ee70b30009314a1b3a47dbec4607b5643c043a0582445_JC.exe

    • Size

      948KB

    • MD5

      30eb517464cabd2db114e04ee21f78dc

    • SHA1

      054aaefcfc142b604f13e28e22f82aa869a17bc7

    • SHA256

      4cf4f2da3b0b5148df4ee70b30009314a1b3a47dbec4607b5643c043a0582445

    • SHA512

      4f39c54c2e3ecea88197e2fb0cfd4a09f621b113711caea6b74b3ee2079f5833db1277b02155092f193d5325fde533af74b1d69e97229ffc96838bed2f26decb

    • SSDEEP

      24576:bj4m9zPIvpppXpppppCOopppXpppppCOxJf2W+ANO8wumpTC5/Mpwxqv:IkISO/OWQA8PUlB

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks