General

  • Target

    tmp

  • Size

    694KB

  • Sample

    231011-gtpmmsdf4s

  • MD5

    a1f785bfdea5c75ed569fc48681eb610

  • SHA1

    89eb5b87feb47c6d47386555658aa6308e0ffef3

  • SHA256

    83cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b

  • SHA512

    7fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967

  • SSDEEP

    12288:Qfbjg65pMyYut1Hl8r8HJFczrPJnsJ3q2zQjz:QfF4U1pEzruw2zuz

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.lubdub.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    J-y!2e_fWMH_XP8F_008

Targets

    • Target

      tmp

    • Size

      694KB

    • MD5

      a1f785bfdea5c75ed569fc48681eb610

    • SHA1

      89eb5b87feb47c6d47386555658aa6308e0ffef3

    • SHA256

      83cfc425e31898223c5cfb0fbb28fb89e6ba02386a5719170869ae974b479f2b

    • SHA512

      7fb1c1f55273b062ca19d6b898e043ad5d3f212b7f8d74532af2e384a896802052acf0a1c52a5a99913c0697cbdcbef2b4040d9baa0ad7d303508ef082787967

    • SSDEEP

      12288:Qfbjg65pMyYut1Hl8r8HJFczrPJnsJ3q2zQjz:QfF4U1pEzruw2zuz

    Score
    10/10
    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks