General

  • Target

    c47f05fbb59552a20ef2cc17a32988f4

  • Size

    492KB

  • Sample

    240313-aq84jshb82

  • MD5

    c47f05fbb59552a20ef2cc17a32988f4

  • SHA1

    97eee917cb0d6eb42901259af2343ff393491e4b

  • SHA256

    57f7611a704a8139664e31c6ff7792916628cfbe8a5acd87fb3966ac859294b4

  • SHA512

    1acd8a430bd78aa32db0ca1a103fa6d4eaf8809c29bd01071d24bcc236532b7ef27c1de7ecb9ffd41da694f8780d12b1a360a000618c2777ad637217154d6402

  • SSDEEP

    12288:V+3RdL6Y4RMFZfI95LeFLPceFsl4Wb1V03bmgpNR1jRqrC:V+3R88695KFgeFslphOvDLRY

Malware Config

Targets

    • Target

      c47f05fbb59552a20ef2cc17a32988f4

    • Size

      492KB

    • MD5

      c47f05fbb59552a20ef2cc17a32988f4

    • SHA1

      97eee917cb0d6eb42901259af2343ff393491e4b

    • SHA256

      57f7611a704a8139664e31c6ff7792916628cfbe8a5acd87fb3966ac859294b4

    • SHA512

      1acd8a430bd78aa32db0ca1a103fa6d4eaf8809c29bd01071d24bcc236532b7ef27c1de7ecb9ffd41da694f8780d12b1a360a000618c2777ad637217154d6402

    • SSDEEP

      12288:V+3RdL6Y4RMFZfI95LeFLPceFsl4Wb1V03bmgpNR1jRqrC:V+3R88695KFgeFslphOvDLRY

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks