General

  • Target

    a331e0bf9d3f7ac97b84e9a6da6f51b53182b5786115a329367fb7c1fe68430dN

  • Size

    2.6MB

  • Sample

    240927-1ffbla1bmn

  • MD5

    ee7ac89311453591a6bf8b88afa2fc40

  • SHA1

    ff61b4f6e932a8924b227f062ecfd013703a3751

  • SHA256

    a331e0bf9d3f7ac97b84e9a6da6f51b53182b5786115a329367fb7c1fe68430d

  • SHA512

    e81fb4dafd9967ec280e58e16ec5dacf1c7e4db2f41dceac25308131125bf11f6b92cba9b073196fcf1990697de1e9535ceffd4538092d8c78760a336f48ef5e

  • SSDEEP

    24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4eS:ObCjPKNqQEfsw43qtmVfq45

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.me.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    RICHARD205lord

Targets

    • Target

      a331e0bf9d3f7ac97b84e9a6da6f51b53182b5786115a329367fb7c1fe68430dN

    • Size

      2.6MB

    • MD5

      ee7ac89311453591a6bf8b88afa2fc40

    • SHA1

      ff61b4f6e932a8924b227f062ecfd013703a3751

    • SHA256

      a331e0bf9d3f7ac97b84e9a6da6f51b53182b5786115a329367fb7c1fe68430d

    • SHA512

      e81fb4dafd9967ec280e58e16ec5dacf1c7e4db2f41dceac25308131125bf11f6b92cba9b073196fcf1990697de1e9535ceffd4538092d8c78760a336f48ef5e

    • SSDEEP

      24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4eS:ObCjPKNqQEfsw43qtmVfq45

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks