General

  • Target

    Storm (16).exe

  • Size

    579KB

  • Sample

    240212-ytrknsbd7y

  • MD5

    6d95391b82df6a6ed6204ef675674f3b

  • SHA1

    3ff215484231f6cd8e84557f7881bab3455ad80a

  • SHA256

    22950c3871f2741d11391c40aedd33c3c1d91f98b79fcb0643267d7b18bcc385

  • SHA512

    bbe745b2103892b97336c9082af7dbbc1646d8a740d8c93d4287e62e7a11fa1d1cc4d61f21783afdfc3647b9828490c5c0418e896022ca886d4abb1dfac0925b

  • SSDEEP

    6144:qQH/HepXj2hOh3gP1wpXdKrrbFb+g7mENAhbOfT+UMgyUVoLWPNSK4c471ik/j4j:q8Ps60mP1wpgfB5b7NlUlcoikpbTs7

Malware Config

Targets

    • Target

      Storm (16).exe

    • Size

      579KB

    • MD5

      6d95391b82df6a6ed6204ef675674f3b

    • SHA1

      3ff215484231f6cd8e84557f7881bab3455ad80a

    • SHA256

      22950c3871f2741d11391c40aedd33c3c1d91f98b79fcb0643267d7b18bcc385

    • SHA512

      bbe745b2103892b97336c9082af7dbbc1646d8a740d8c93d4287e62e7a11fa1d1cc4d61f21783afdfc3647b9828490c5c0418e896022ca886d4abb1dfac0925b

    • SSDEEP

      6144:qQH/HepXj2hOh3gP1wpXdKrrbFb+g7mENAhbOfT+UMgyUVoLWPNSK4c471ik/j4j:q8Ps60mP1wpgfB5b7NlUlcoikpbTs7

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks