General

  • Target

    bacfce630c06766a1c54b55395b84232dfb01a99844a0c732fa45470d9bd434b_JC.exe

  • Size

    12.6MB

  • Sample

    231004-w1vvkafg96

  • MD5

    e16678adff0c94c5c107ff9e3672a6c9

  • SHA1

    e5e5cf0a3c5d645bcbc171dfa7e1943e3be53508

  • SHA256

    bacfce630c06766a1c54b55395b84232dfb01a99844a0c732fa45470d9bd434b

  • SHA512

    4035ee5502a9da356c5652b5f9c3600f67540af8af87bf4b780f814188db57ed048ef67aa6e468919d0b90bd1594e17cdbdd8a3cd20230b7bd519c1f3c7519c2

  • SSDEEP

    49152:bK32UW/tIMGh2aiASiUyDA147Bf6w9o1grqRykI6c4V/HJY/oFTYpKA3hLAuewii:

Malware Config

Targets

    • Target

      bacfce630c06766a1c54b55395b84232dfb01a99844a0c732fa45470d9bd434b_JC.exe

    • Size

      12.6MB

    • MD5

      e16678adff0c94c5c107ff9e3672a6c9

    • SHA1

      e5e5cf0a3c5d645bcbc171dfa7e1943e3be53508

    • SHA256

      bacfce630c06766a1c54b55395b84232dfb01a99844a0c732fa45470d9bd434b

    • SHA512

      4035ee5502a9da356c5652b5f9c3600f67540af8af87bf4b780f814188db57ed048ef67aa6e468919d0b90bd1594e17cdbdd8a3cd20230b7bd519c1f3c7519c2

    • SSDEEP

      49152:bK32UW/tIMGh2aiASiUyDA147Bf6w9o1grqRykI6c4V/HJY/oFTYpKA3hLAuewii:

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks