General

  • Target

    b4b9e8a6f2d04c54fb3542ba54e0bdfa

  • Size

    1.4MB

  • Sample

    240305-pyz8yafh52

  • MD5

    b4b9e8a6f2d04c54fb3542ba54e0bdfa

  • SHA1

    99dec50a0ae47aadb2fb4c6d5714c9ddefb31be4

  • SHA256

    b006313f44d7ed472bc8046a403ab3a8a7298cd0165e33dafebd7abee32b8c46

  • SHA512

    3eecb04dbc46b058eb6bbd395c5910b912e4da801333f4d08a17cac47beeb8ccbbd3e438db822e52776f4887d4ef28ed50783c17c4df19d18b2656b45dcfc98e

  • SSDEEP

    12288:ORsAU/+W7itTPGHRlRXwPgWoIiAFLm6+0Jwg:OCv/+jtaHRjXwZjm2D

Malware Config

Targets

    • Target

      b4b9e8a6f2d04c54fb3542ba54e0bdfa

    • Size

      1.4MB

    • MD5

      b4b9e8a6f2d04c54fb3542ba54e0bdfa

    • SHA1

      99dec50a0ae47aadb2fb4c6d5714c9ddefb31be4

    • SHA256

      b006313f44d7ed472bc8046a403ab3a8a7298cd0165e33dafebd7abee32b8c46

    • SHA512

      3eecb04dbc46b058eb6bbd395c5910b912e4da801333f4d08a17cac47beeb8ccbbd3e438db822e52776f4887d4ef28ed50783c17c4df19d18b2656b45dcfc98e

    • SSDEEP

      12288:ORsAU/+W7itTPGHRlRXwPgWoIiAFLm6+0Jwg:OCv/+jtaHRjXwZjm2D

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Looks for VMWare drivers on disk

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks