General

  • Target

    d35d1875-1e66-45b2-9bf8-3c8c237ed79e.exe

  • Size

    234KB

  • Sample

    231011-k3dhhsfa37

  • MD5

    547b88c4aa225377d7d65e912d81fe28

  • SHA1

    8ec7e39c9b7c1e8e128cd1cc8401aa2b9a9cf40d

  • SHA256

    113e16425e010952150f3c1f7ae615602cd4ca30826b0e7518aa058341058a94

  • SHA512

    679eda872ca9df58ce9770f1fc8f2f88a0ca923546f9d8a4e26df747b4c6c2a46783066d937eabc03e9f08694e7eecdcd569e2da04416d154b36223f706de91b

  • SSDEEP

    3072:8qmTPjuhlRJFQUGzXBtRGJOiFb5AjZpFh0:8RPjuhlRJFKzXwL95ADD

Malware Config

Targets

    • Target

      d35d1875-1e66-45b2-9bf8-3c8c237ed79e.exe

    • Size

      234KB

    • MD5

      547b88c4aa225377d7d65e912d81fe28

    • SHA1

      8ec7e39c9b7c1e8e128cd1cc8401aa2b9a9cf40d

    • SHA256

      113e16425e010952150f3c1f7ae615602cd4ca30826b0e7518aa058341058a94

    • SHA512

      679eda872ca9df58ce9770f1fc8f2f88a0ca923546f9d8a4e26df747b4c6c2a46783066d937eabc03e9f08694e7eecdcd569e2da04416d154b36223f706de91b

    • SSDEEP

      3072:8qmTPjuhlRJFQUGzXBtRGJOiFb5AjZpFh0:8RPjuhlRJFKzXwL95ADD

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks