General

  • Target

    8f5e18289cca9c4b630e7611abfba4fa

  • Size

    2.9MB

  • Sample

    240204-rmtccsdgdq

  • MD5

    8f5e18289cca9c4b630e7611abfba4fa

  • SHA1

    d54b8bd5680c349bea0626534d2f880a592d0cae

  • SHA256

    8f393c63edeb3eec92a2d7ffb161ec561f9dc7e92ad856de1c1abfbc57dd5d9b

  • SHA512

    0f650b5ca9427119f3c92ac5c946c96394b78018b54375b788256bec2464b529dd79675166e6fdb007d17da99cee784499dcd94386f635c744cb0562013fd9ec

  • SSDEEP

    49152:+QUhQaL7tJwN3J8YHM5be1v+wqgpsoqP1Hj3R1zjN/UPXC5G/U6bn0sv5o8yZhcZ:+rtJwN3FHM5be1PX+j1V1RUvC5G/N0sF

Score
7/10

Malware Config

Targets

    • Target

      digsby.exe

    • Size

      4.3MB

    • MD5

      23373ca71fac6bb31dcbd34b3279cc8d

    • SHA1

      5bc114be9ad663437c4a43fbf49ca4c93d0b1a86

    • SHA256

      407649f83cc56ce9e54bfea2ea0aa723080b9538b090c5ba8c6818af9d376f3f

    • SHA512

      eddb2c7c400e175f5f9d5cd20b06b90dacc48171e4599b1f17433287bca89a5e98f332d9f2a22c6c4a356af44fed75d6fed285ee87090c5102209b18613d7d39

    • SSDEEP

      98304:gNY19Kjc/MAKbUwpRBQQfthOImTs57wfQPr1s3db1vaDmZMqtGNclABFE:8Y19T/MAKIwbBQAthOImTs5Xrqtb1OmZ

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Target

      新云软件.url

    • Size

      133B

    • MD5

      4f0017b3b346bd0626f0c3b915e6e734

    • SHA1

      823bf3ff9e16cd636c9dc0dc690d6a586fcbfe92

    • SHA256

      df65af1fc1e09f6effbde7e0ef1cb64d6caeef1f62b0e6467821efa032533678

    • SHA512

      0f5eb5024cf6a0323f7998d419995a707c48de917a5899a185369e6acfeb17c09ffa03f7d110adc87b8de20b7d4bf30d50c72479bfb18614d2e21cbe169dc5a6

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks