General

  • Target

    2da7bf9746285b9afeab2254c225a9ee

  • Size

    60KB

  • Sample

    231225-t35rfahhc2

  • MD5

    2da7bf9746285b9afeab2254c225a9ee

  • SHA1

    e0fab53965e2d5df57e1139cb6b87f3391126095

  • SHA256

    e90e778e03fdd92a511f91cea11a5257d8b8536f40ab6dae9875ef1863911aa7

  • SHA512

    184f48b144b86a2aeda9edbc7492acd4c34a87c76c530ad04e44e3d83f018cd42c52c51c6fe03ec1a3fb509ebb4826db90bb5de42d99fb786f7fcade1470ab2e

  • SSDEEP

    768:/24GjjRzPyI6TfDarzerws8FJd/f0ElsL9KyeVKgKhvS7XFZBs9MvO:jGfRzn8DuOHM/f0OsAye9cS7XS98O

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    killerxknight

Targets

    • Target

      2da7bf9746285b9afeab2254c225a9ee

    • Size

      60KB

    • MD5

      2da7bf9746285b9afeab2254c225a9ee

    • SHA1

      e0fab53965e2d5df57e1139cb6b87f3391126095

    • SHA256

      e90e778e03fdd92a511f91cea11a5257d8b8536f40ab6dae9875ef1863911aa7

    • SHA512

      184f48b144b86a2aeda9edbc7492acd4c34a87c76c530ad04e44e3d83f018cd42c52c51c6fe03ec1a3fb509ebb4826db90bb5de42d99fb786f7fcade1470ab2e

    • SSDEEP

      768:/24GjjRzPyI6TfDarzerws8FJd/f0ElsL9KyeVKgKhvS7XFZBs9MvO:jGfRzn8DuOHM/f0OsAye9cS7XS98O

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks