General

  • Target

    Revised invoice.rar

  • Size

    607KB

  • Sample

    231004-h47fwabg78

  • MD5

    8ad71cc8ed5f03dbed1e37f88c83ce82

  • SHA1

    647db719766240fabdd00a1594994d59821cda0b

  • SHA256

    4d1891e2a9f5cfe1051d05bdab25137017ac07f3769c25e44f1078a9e92bbe79

  • SHA512

    380bb6d07fd620fba0a4de70f3485fb7790b9564651f81dfe625f0c86c3a7b12c8c8fd6a26b266480655302194b7bc2f9c3234acc0afcff279edfa9dfbe8f6fe

  • SSDEEP

    12288:iP/C2ARqvU9zWR/aVULMsG6b8GZjEz4xSiKSP5mwbUXsWl:iPaVRqvdNaVZs1pjEz4xiygiol

Malware Config

Targets

    • Target

      xgOsdqKwd2CPlvC.exe

    • Size

      647KB

    • MD5

      77228713b1ae12efaddd001535782c1d

    • SHA1

      a8270c88399a47d739289190f1a06da12d55afbc

    • SHA256

      8a6c6cf2621bc864fe773ead086f95b0d95a6d959f0920b59c571242ef5aa126

    • SHA512

      b1ce8a004fc08c09715ac6459556f2d8d6cbeee9c34d1efd9584ccdba982349b868676f238a655224eb9705e467d1abff008b84c9095469b96dea2a211b20a29

    • SSDEEP

      12288:AJysnoROJFmRp7OCy+RFS5p/IoGB5EErDIrQz+CUB8QvpKU8b6ZsZKpn6s+jfOF5:IoqMRp7OCZ2DGB5EErh2vp+OZsns+i

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks