General

  • Target

    21589fa1487729166e4f22e47acebdc6

  • Size

    521KB

  • Sample

    231231-akhdmscfhk

  • MD5

    21589fa1487729166e4f22e47acebdc6

  • SHA1

    d5ffc8163e9bfde9458506f86cf59743155e0d78

  • SHA256

    9cc2ff00ce8f65a65a7a798b4b955affeb29c9473d0e956b228ab80a2e07bd7c

  • SHA512

    5b0bed53ab09f5475e06ce0a7b236bf53b935e32beeb8133eb03050e7f1373a5bb8db0c709b8588632112448fa601510325515bb3f973ec17c129b46340ad575

  • SSDEEP

    6144:d25mswOyIZjyMrmhc2TawYaOt2da2k78qh90GiTwXw35lk9jgvy89:d2wRIZgvOJDz9fA35lk9N

Malware Config

Targets

    • Target

      21589fa1487729166e4f22e47acebdc6

    • Size

      521KB

    • MD5

      21589fa1487729166e4f22e47acebdc6

    • SHA1

      d5ffc8163e9bfde9458506f86cf59743155e0d78

    • SHA256

      9cc2ff00ce8f65a65a7a798b4b955affeb29c9473d0e956b228ab80a2e07bd7c

    • SHA512

      5b0bed53ab09f5475e06ce0a7b236bf53b935e32beeb8133eb03050e7f1373a5bb8db0c709b8588632112448fa601510325515bb3f973ec17c129b46340ad575

    • SSDEEP

      6144:d25mswOyIZjyMrmhc2TawYaOt2da2k78qh90GiTwXw35lk9jgvy89:d2wRIZgvOJDz9fA35lk9N

    • UAC bypass

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks