General

  • Target

    f9d4d72bd272a4c2d5a84f7ce2dbe3cf5d041de49a87560252ea1cd40ee5edab.bat

  • Size

    942KB

  • Sample

    230901-vb858aga91

  • MD5

    4952568d9c4001507f1dddb00ecab840

  • SHA1

    dc8a47073962efe91fb965db992c84d401da391b

  • SHA256

    f9d4d72bd272a4c2d5a84f7ce2dbe3cf5d041de49a87560252ea1cd40ee5edab

  • SHA512

    a5b2006e97e693ff47fda30859003a6565f039f83ebf4c1e9485221e14bb0cad1b3f668f6961b95e811bf0fc482b047ad021a5536d856304a6cf99478c5f566f

  • SSDEEP

    24576:i7jIEkrDvmeLFsPXmK9IwHl1oCGG5SXCzi3Ij+kz:i7qU2KdHdt9

Malware Config

Targets

    • Target

      f9d4d72bd272a4c2d5a84f7ce2dbe3cf5d041de49a87560252ea1cd40ee5edab.bat

    • Size

      942KB

    • MD5

      4952568d9c4001507f1dddb00ecab840

    • SHA1

      dc8a47073962efe91fb965db992c84d401da391b

    • SHA256

      f9d4d72bd272a4c2d5a84f7ce2dbe3cf5d041de49a87560252ea1cd40ee5edab

    • SHA512

      a5b2006e97e693ff47fda30859003a6565f039f83ebf4c1e9485221e14bb0cad1b3f668f6961b95e811bf0fc482b047ad021a5536d856304a6cf99478c5f566f

    • SSDEEP

      24576:i7jIEkrDvmeLFsPXmK9IwHl1oCGG5SXCzi3Ij+kz:i7qU2KdHdt9

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks