General

  • Target

    3d2b5b2bb9898c528c6800018b6225965bec251fc3f49ccf1d2cc42dde7c2018

  • Size

    447KB

  • Sample

    231002-x3zf7sfg63

  • MD5

    bd8e0300c2ca066e68b93e523ad01f28

  • SHA1

    4a394a8618e9bc7876fc6de227d744886fe8f51d

  • SHA256

    3d2b5b2bb9898c528c6800018b6225965bec251fc3f49ccf1d2cc42dde7c2018

  • SHA512

    28a2b2e10e61dd1df03c0637c9a0781877eb06c72999faaa57b6b7150ca8cb26cb2b9ab5c340e94b5a7ffe35742c8106dae1b01ea962f491ed89970049ff95e2

  • SSDEEP

    12288:CvCwf6Hw6DYkXrrjn9wDioy+z+DBCwFr0XH3tPgpkHQej7x+N:GfZk7M5rzwBjr059QO7xY

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Chibuonyenze8888

Targets

    • Target

      PO698535787884.bat

    • Size

      618KB

    • MD5

      9041039000fabe2ec5a095d7466c2a63

    • SHA1

      0b5ac9c7ce086fc844dd9c8dadfa72f9c7cbd210

    • SHA256

      fdd1809f12f7c3da60911712659cb458ea68a10f2db7a08dd0b4a4d49c0ac7c0

    • SHA512

      0ab192616ade6c4349ec259b8155e90d0317e3590f8f9ec077f30f506fc30bef9f38e8cc76504f94ab16a02839140194c762ce5d212c28245e1ea113751062ed

    • SSDEEP

      12288:fM0yMLFPlP5ZkXrrTJ9i5ioy+zgDdCwTPIXH3tPO3QtQB8K:f7LFtnk7E5rzSdRPI5zQB

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks