General

  • Target

    d097e2ac8c21199c4ac20128dfbd62d7f8430549cb6cad0869ec9bd7a82c7a25.zip

  • Size

    427KB

  • Sample

    240711-dhw1ssxglf

  • MD5

    542cfeaf5b91efebd19a3684d981d9fe

  • SHA1

    d0b2ff99a5b141b6467764938ac326c34c8b76f5

  • SHA256

    d097e2ac8c21199c4ac20128dfbd62d7f8430549cb6cad0869ec9bd7a82c7a25

  • SHA512

    0bfd8549a3196f449cbaf3f1ed085b66ea758722a40ed5bd41675510c635b604f8ef923f835f4c8bd5309b853d872ec8d0dedae53b8569b78a5ae9ec65500588

  • SSDEEP

    12288:aC88DcxtnvNaCKf6a7QuHTODxEq9IhliIW+UZVY:HzDYtvNaDfz7Q6TOVEq9I7QVY

Malware Config

Targets

    • Target

      Ship Docs YINGHAI-MANE PO 240786/Ship Docs YINGHAI-MANE PO 240786.xlsx.exe

    • Size

      691KB

    • MD5

      de9ba9c06dc7cf61fdd6337a09f80d1b

    • SHA1

      196d7e5ac998bfc5b4b0dfeb201671b47b060f42

    • SHA256

      60a9849860e8fb91cd4440d685521bd18314679d85ab55217d7b64e61ef2d372

    • SHA512

      91f900508d573202be4bd8d730c68ae4ae0fc6349856070c9d19096d2690ec38f2c3ecf5ebebaf59ba0a09116c840c0f944e85620b485a25b25614bcd3a2eb98

    • SSDEEP

      12288:62oh+sohMjhrgty/Q44AzJrgfOPI1yJihVG/nuT8YcwgJytYFDuZkmHNxbHT:12gxEJAG48cPtYFxm3HT

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks