General

  • Target

    9734ce56998d57fe7995960daf0ab1642f2b7a56e651b327375979fcbd8322ab

  • Size

    780KB

  • Sample

    231010-m3xmhaeh84

  • MD5

    053c967e6800b452697ea64d7857c764

  • SHA1

    3482a6787c3b8c132fc76ef39e0a6c9dc07d58c9

  • SHA256

    9734ce56998d57fe7995960daf0ab1642f2b7a56e651b327375979fcbd8322ab

  • SHA512

    18ce566ac206376647ce6ca0220391708d2d81a43da1ca303c3a9eb536443f114a153cb9dfac1fcee7461581ed60f50358b2329561a57bb212f13315cc0ad18d

  • SSDEEP

    12288:FHEhisS3laPl1UK9feGUFo0dKaAoHc/xPf3X3Nx48ZpfD1wrXaZSUjJ:FH6NPl1lpKxoavcJfHtPfZwrujJ

Score
7/10

Malware Config

Targets

    • Target

      ACCOUNT DETAILS&INVOICE.exe

    • Size

      1.1MB

    • MD5

      5f8510909aece45d7644c8407954eb5d

    • SHA1

      55e336b8ff054afa05f2d3c76816b60e17872e55

    • SHA256

      5485c351ca583b40b70345114311f9f514014c054b5317ef6c5744a3faed5233

    • SHA512

      af83ef3d4484184edcc2e0a1d3d778e494a24bac0950aa512a0c99d61127a6dd2da666f4559e2d7c02957da08331f3bd3a85ae588ebb82e5a5a53e967a308c37

    • SSDEEP

      24576:2an7Ct3CPlldZA/4nse5scMbfZkZUqdJ1q:DQ2lc/Lee7ZkVq

    Score
    7/10
    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks