General

  • Target

    MQVIFDDBKZ.bin.zip

  • Size

    2.0MB

  • Sample

    230916-k64h4she2y

  • MD5

    95aa5131df54068b7883b849888e91e2

  • SHA1

    76012d35c71189922d6f66c09f96cc076a14d572

  • SHA256

    a7f20208e2acdaef29b5684758c3d6c330ecf984982dcbb837ba162c88290950

  • SHA512

    65dcef53bd3c79fc79cebef50f205d94cba59f3f94f38591999e4c4486c9e1fa51d1d280de1e86ece47101336b0c08ebd87b42a2059b689c4bf49864666df1d9

  • SSDEEP

    49152:y6RVwfL+6Oncd50MHHmYH5bU8vOCYZqGCXZNI2ZM:+L+6OcwoGYRvOC+YXd6

Malware Config

Targets

    • Target

      MQVIFDDBKZ.bin

    • Size

      4.2MB

    • MD5

      5f935bf59dd02975d2fcceebdb704ff5

    • SHA1

      a845035c8abd398980dde847a79f0101df783481

    • SHA256

      adde97df86a4bddb26838cbc17b26a0e02966ba786747ff943150a72fac5fba6

    • SHA512

      03d6bc3b9edb15ca5c0b9a18aa18e72bf8bc9a21e03acbba8917abe6e90aa408fe80176a3081409579e47918e8e80a14991335aa021ad8a99f523e920853d906

    • SSDEEP

      49152:UcPaYhZjSIhfmzp45kfFos9UUEYSoh26XX6KB7d5egU+1dhXpCm9vEMDj2gmYXAt:tjffmSk+YxhBJHDRvAYbvGgw+js

    Score
    7/10
    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v15

Tasks