General

  • Target

    b79a64e2439ca9ebeb8fa3cd36f62c21

  • Size

    121KB

  • Sample

    240306-rkaggadg66

  • MD5

    b79a64e2439ca9ebeb8fa3cd36f62c21

  • SHA1

    a1ff54a4f905c3293557f75779ee242d45fe58af

  • SHA256

    e3e84fc750d1723ef43cbb825befb65e9786dc1666ac89d082e01bfddaaa749c

  • SHA512

    00744ac6765855d64c4ca9d77fbd68a6a9ab035308329d28acd0bd553c922f1c3638da7a8dcc8f40c24a29f8b804df6117b30b182a59d9d9661e19337e599490

  • SSDEEP

    3072:XP9D2JK8J7jEpZsahrBZ4mqOuI4v3/KW47X4wSxhxbVmg6hF79pLKj83wg9CVmtd:Rtes

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    b1a2gp8855

Targets

    • Target

      b79a64e2439ca9ebeb8fa3cd36f62c21

    • Size

      121KB

    • MD5

      b79a64e2439ca9ebeb8fa3cd36f62c21

    • SHA1

      a1ff54a4f905c3293557f75779ee242d45fe58af

    • SHA256

      e3e84fc750d1723ef43cbb825befb65e9786dc1666ac89d082e01bfddaaa749c

    • SHA512

      00744ac6765855d64c4ca9d77fbd68a6a9ab035308329d28acd0bd553c922f1c3638da7a8dcc8f40c24a29f8b804df6117b30b182a59d9d9661e19337e599490

    • SSDEEP

      3072:XP9D2JK8J7jEpZsahrBZ4mqOuI4v3/KW47X4wSxhxbVmg6hF79pLKj83wg9CVmtd:Rtes

    • Modifies WinLogon for persistence

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks