General

  • Target

    W32.MyDoom.A (1).zip

  • Size

    293KB

  • Sample

    240814-rdt8aswdnf

  • MD5

    ee70b23f67565ce4822f0f5f8d24525e

  • SHA1

    b7d18219951580dbd9f35d7c547ab65853dcbc76

  • SHA256

    8f78806e212e18346b63aebddef9d4ffdc15e12d6c6485b73353989f382acb88

  • SHA512

    5e616915ba3135b75f12bd3c20fa2c4084903fa955f4ea172e5059d4e717ed5a2184e3d1efacc019f2f9bc4d74848a8b3da888c3d3f01179260d12813becdaa9

  • SSDEEP

    6144:wbcyHrF3W6aYQ5UEL2DJ7ikAjteG/QBfJv6hYRFz6FaqXCwLqbCJ:wbcqBW6aYcKN7ikAjteEKBCyRFz4LSwd

Malware Config

Targets

    • Target

      W32.Mydoom.htm

    • Size

      39KB

    • MD5

      10a5ce311f8f925a5d180d01aa62b560

    • SHA1

      3b9eae541c1bda796a8a29671671d666a32d68f5

    • SHA256

      666c6ad2b3bdeac9c0d42a263631958b3e2e77b197859559b90b5a193b3c81ca

    • SHA512

      e322dc16f5b2b689102ab55c2a7c8eaed00d4c514d44c3445b91d1a60fd5be2edaf753396932d3b27d020e054a822fb704454e86c107a9e6e81e82b183c477b8

    • SSDEEP

      768:/DS7/t18rlh0iofFsJUxcuhupvjMktozccKc:/DS7/t18rkio9sJUxc6AcKc

    Score
    3/10
    • Target

      W32.Mydoom_files/main_menu.js

    • Size

      23KB

    • MD5

      bf88f11a54b6275c5285441b49dd0341

    • SHA1

      41bcad3810c558bd91131b177b03e73790ba9a72

    • SHA256

      93340748e34791353ee5cf5c0a621eb516a39e2db9340e3dde0848ae7dc5bbca

    • SHA512

      75b776359185bdbdcbe90f3419c1ef718f8dec71d663df28def1cdaf8d8b6769f5943e039b3eb55e3f02911ca218939071c8e26e220ab841eb82fe2f9c0909d0

    • SSDEEP

      192:49M8pFkwrB9eZ4TU7APB1N/9OH3oKkQjYLk+4eXgs/KV/XvCG2TzeR23iAEG/nPc:49M8p+wrB9045BVM3Bbs/LHa0iY/tKp

    Score
    3/10
    • Target

      W32.Mydoom_files/main_menu_new.js

    • Size

      23KB

    • MD5

      f7011397d4a29047ed7f38e7f4b5e316

    • SHA1

      95da4d1ff8e4a81d0759295d8d5d155c77ac1225

    • SHA256

      1ba25dfe203615ac5596af333608187aeacf983a0a45c9359a4c99e60f5b29d8

    • SHA512

      0596426486dc85302078b6cf4a5ba710199ce6dd002832660953f4717d99fc264cc9cb7bca17bcd881dce9c5ceaa5efdff153ab47929f4a7137fe3eeff753e59

    • SSDEEP

      192:49M8pFkwrB9eZ4TU7APB1N/9OH3oKMQjYLK+4eXgs/qOXBfN2TzeRY3JAQG/ZbVY:49M8p+wrB9045BVM3hJs/5EamJk/Lkp

    Score
    3/10
    • Target

      W32.Mydoom_files/menu.js

    • Size

      2KB

    • MD5

      e4ee797c0c17831cf332ee7edce982ef

    • SHA1

      fbe456e11f803bae1cf18c0505962a3fe879b3ec

    • SHA256

      4cf3cea3a8586ff6093d74cf373b7d47fc00193ec62301495b6dab466bac8574

    • SHA512

      94e7ada334b87186fbefa1576f5ff4002372d37bd07d7dab5a5e666b7489c678b4abde40d4ccebf3209bf32a84cfdbf376de44eb4e5d0b2de3b20828f5444c45

    Score
    3/10
    • Target

      f-mydoom.exe

    • Size

      111KB

    • MD5

      91800f7d2ca85deedba2735c8b4505ce

    • SHA1

      92fe08cb0213e0e07fdd0382da0178834ef5e401

    • SHA256

      e98dccc92e1733f8736678d82b3d1a8c6388b8cb1e42a5083d113cf75fb0577d

    • SHA512

      89359ccbe64ee1fec2ac7446b3022cd38e2316507b1a938fbf5a3171c8b43333dd6b04b1faa597dbe6e20fd243056798336805405bedfb761e9d4ee649109a40

    • SSDEEP

      3072:eL//liK0SY+3CPzEWrfxCuXhcxM7uu2hFgzp:G//liK0SY+3CP2uXKar2h2

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Target

      strip-girl-2.0bdcom_patches.exe

    • Size

      22KB

    • MD5

      53df39092394741514bc050f3d6a06a9

    • SHA1

      f91a4d7ac276b8e8b7ae41c22587c89a39ddcea5

    • SHA256

      fff0ccf5feaf5d46b295f770ad398b6d572909b00e2b8bcd1b1c286c70cd9151

    • SHA512

      9792017109cf6ffc783e67be2a4361aa2c0792a359718434fec53e83feed6a9a2f0f331e9951f798e7fb89421fdc1ac0e083527c3d3b6dd71b7fdd90836023a0

    • SSDEEP

      384:96ZQHXcE7hUHwT56cC9Kg65JdwGADkHw/Rjxtuu7VIGGwQWEqpD6:CavuHAUcW/ojwG6kHw/lxqbW

    Score
    7/10
    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

3
T1059

JavaScript

3
T1059.007

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Browser Information Discovery

1
T1217

System Location Discovery

3
T1614

System Language Discovery

3
T1614.001

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks