General

  • Target

    6a053f5c71b94d17a8603accc98bdeeb5b82008c6b5794a12be2ccd6f1f143a5_JC.exe

  • Size

    527KB

  • Sample

    231010-v9qrjaha69

  • MD5

    4612e5911cb175c3d938302ffc210f3b

  • SHA1

    c5e0f0351c7e4582f7912dcc1427892517896815

  • SHA256

    6a053f5c71b94d17a8603accc98bdeeb5b82008c6b5794a12be2ccd6f1f143a5

  • SHA512

    e49de9717e96cc9e4fafbba60a11ef8b5ba1f9d3d9177400f9aa3ca876063231f088cb824920cef62cb7fde09a37096e67e743981a3e916807a4df108631b235

  • SSDEEP

    12288:GhOFSjc+NCAuPe0y/jGofSiC+qtDWjLlHCsM:jURMAfrChtDW3lHE

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    premium89.web-hosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    blessing@@ 123 45

Targets

    • Target

      6a053f5c71b94d17a8603accc98bdeeb5b82008c6b5794a12be2ccd6f1f143a5_JC.exe

    • Size

      527KB

    • MD5

      4612e5911cb175c3d938302ffc210f3b

    • SHA1

      c5e0f0351c7e4582f7912dcc1427892517896815

    • SHA256

      6a053f5c71b94d17a8603accc98bdeeb5b82008c6b5794a12be2ccd6f1f143a5

    • SHA512

      e49de9717e96cc9e4fafbba60a11ef8b5ba1f9d3d9177400f9aa3ca876063231f088cb824920cef62cb7fde09a37096e67e743981a3e916807a4df108631b235

    • SSDEEP

      12288:GhOFSjc+NCAuPe0y/jGofSiC+qtDWjLlHCsM:jURMAfrChtDW3lHE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks