General

  • Target

    Invoice.exe

  • Size

    619KB

  • Sample

    231012-s511lahd4y

  • MD5

    9b72692e206d68443a96079389898ee5

  • SHA1

    8512515d696683c9c994f9fd8878b1b3b80299d9

  • SHA256

    9886fa5dd072d4bb23ea5353ac0014d36b5425f49fdb0b315a2ed54cc5fcc33d

  • SHA512

    a265e32d9dc6837cc8a1497c31f5630ab634a7a192c8c361b5ce7350fbe93cfa4c8fe3f77897f34bf0f45dbd45021527a7ff2f6f2b08f5640ce371f062f067f3

  • SSDEEP

    12288:KMYnQ3j67SESV1eXl8OhA90pEPsL6U6g7t6+BmTsbqK3l2FzeqCrpoYoujW/:KBwfzSTM+qK12FqreaW/

Score
7/10

Malware Config

Targets

    • Target

      Invoice.exe

    • Size

      619KB

    • MD5

      9b72692e206d68443a96079389898ee5

    • SHA1

      8512515d696683c9c994f9fd8878b1b3b80299d9

    • SHA256

      9886fa5dd072d4bb23ea5353ac0014d36b5425f49fdb0b315a2ed54cc5fcc33d

    • SHA512

      a265e32d9dc6837cc8a1497c31f5630ab634a7a192c8c361b5ce7350fbe93cfa4c8fe3f77897f34bf0f45dbd45021527a7ff2f6f2b08f5640ce371f062f067f3

    • SSDEEP

      12288:KMYnQ3j67SESV1eXl8OhA90pEPsL6U6g7t6+BmTsbqK3l2FzeqCrpoYoujW/:KBwfzSTM+qK12FqreaW/

    Score
    7/10
    • Drops startup file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks