General

  • Target

    2d85a173457b16855a1a96e6cfc24b37

  • Size

    72KB

  • Sample

    231225-t2xdnshfd9

  • MD5

    2d85a173457b16855a1a96e6cfc24b37

  • SHA1

    e00c2af026dcb19cc543fa8ed9d2771a5e151657

  • SHA256

    e41774ed1008ad59c2b1ae3d10a4588bb99ddc79590be69e449d72f74a27b145

  • SHA512

    38cc529f14ec6426d37be422877cf88adb77e75d4086e3eda3d921ee7043f8ec97e850c645a1a6fc67d04dce3f14168cbbe1262812142415cec32951d01f3fde

  • SSDEEP

    1536:Loc1DEDp2kskuG527ImcGBZOHu450m9cW0bjf:LGDp2ZkuG52EmcGrOVym9cWAz

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    1Lovelogs

Targets

    • Target

      2d85a173457b16855a1a96e6cfc24b37

    • Size

      72KB

    • MD5

      2d85a173457b16855a1a96e6cfc24b37

    • SHA1

      e00c2af026dcb19cc543fa8ed9d2771a5e151657

    • SHA256

      e41774ed1008ad59c2b1ae3d10a4588bb99ddc79590be69e449d72f74a27b145

    • SHA512

      38cc529f14ec6426d37be422877cf88adb77e75d4086e3eda3d921ee7043f8ec97e850c645a1a6fc67d04dce3f14168cbbe1262812142415cec32951d01f3fde

    • SSDEEP

      1536:Loc1DEDp2kskuG527ImcGBZOHu450m9cW0bjf:LGDp2ZkuG52EmcGrOVym9cWAz

    • Modifies Installed Components in the registry

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks