General

  • Target

    payment.exe

  • Size

    747KB

  • Sample

    230821-kt7d8sbh96

  • MD5

    5a9bce6908490be3729050df12be32b9

  • SHA1

    a9e5db1d42349eada2198a2c8cef15babe338bb2

  • SHA256

    f04ace87c55691161603b413725e8a4a6e8035260678e7d0b3b39b51d8c23cc4

  • SHA512

    864427973f23054b2e4f7e6efa1a0b0b4b727c89f9b27465799448ffd79953ab0bb357fdb503c4608caac415613f4a1bd501518be1ba5c3d68aa1ff58b1818f3

  • SSDEEP

    12288:CMsVh3mHgDWA0WHQiLHyP40wI8AzR6HT9XWZQp5Jrc1MPUkFDLn1h5ZjNl0b:CmHU3bHrK40wI1CT9B5Jg1MFVLnDD

Score
9/10

Malware Config

Targets

    • Target

      payment.exe

    • Size

      747KB

    • MD5

      5a9bce6908490be3729050df12be32b9

    • SHA1

      a9e5db1d42349eada2198a2c8cef15babe338bb2

    • SHA256

      f04ace87c55691161603b413725e8a4a6e8035260678e7d0b3b39b51d8c23cc4

    • SHA512

      864427973f23054b2e4f7e6efa1a0b0b4b727c89f9b27465799448ffd79953ab0bb357fdb503c4608caac415613f4a1bd501518be1ba5c3d68aa1ff58b1818f3

    • SSDEEP

      12288:CMsVh3mHgDWA0WHQiLHyP40wI8AzR6HT9XWZQp5Jrc1MPUkFDLn1h5ZjNl0b:CmHU3bHrK40wI1CT9B5Jg1MFVLnDD

    Score
    9/10
    • family_kraken

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks