General

  • Target

    4b3145378e583cc44b019b5e5eaab0c7a0918facbf62ba7e8bc62e5641b1e7c7

  • Size

    883KB

  • Sample

    240727-bd13vazbkg

  • MD5

    3201da4430b9e929d8c78ddd48f04c42

  • SHA1

    8292447bd3307902a38aae9e44082dbe4032103e

  • SHA256

    4b3145378e583cc44b019b5e5eaab0c7a0918facbf62ba7e8bc62e5641b1e7c7

  • SHA512

    9e8cdc0acb224a469e287cf4694b11c6d589f0e302af665ef584d16b5888e231043d9d2abfff27ef026dca02420b3dcb92b0fd65aa300261166fa1bda248a783

  • SSDEEP

    24576:5bd5JElZIzGIl+o95Jp6SpLYhW1tMSqBJgdLfnbyM:5bnGlZIzEMF2hW1tMSU+RfnuM

Malware Config

Targets

    • Target

      4b3145378e583cc44b019b5e5eaab0c7a0918facbf62ba7e8bc62e5641b1e7c7

    • Size

      883KB

    • MD5

      3201da4430b9e929d8c78ddd48f04c42

    • SHA1

      8292447bd3307902a38aae9e44082dbe4032103e

    • SHA256

      4b3145378e583cc44b019b5e5eaab0c7a0918facbf62ba7e8bc62e5641b1e7c7

    • SHA512

      9e8cdc0acb224a469e287cf4694b11c6d589f0e302af665ef584d16b5888e231043d9d2abfff27ef026dca02420b3dcb92b0fd65aa300261166fa1bda248a783

    • SSDEEP

      24576:5bd5JElZIzGIl+o95Jp6SpLYhW1tMSqBJgdLfnbyM:5bnGlZIzEMF2hW1tMSU+RfnuM

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks