Resubmissions

30-10-2024 10:51

241030-mx9d4stjdp 10

General

  • Target

    16e3b155eaf7d1979f651c9d8212c713.vbs

  • Size

    1.0MB

  • Sample

    241030-mx9d4stjdp

  • MD5

    16e3b155eaf7d1979f651c9d8212c713

  • SHA1

    1dadee69bc3a2272aa4fee3ccd95ab28f7c212b1

  • SHA256

    9cabd83bf12ccdc253c9bad639a0a7fb32adeb42958107db83bcb873a7821a0e

  • SHA512

    8d7c53cb2a806b9db342e7fe096fccd1c5c210c752ede70efca9838d76dd4ad0e6534747cdf408c794a9d4d89d197de5cf2378b54c7109d73f3c539a6face19b

  • SSDEEP

    12288:kErj1/mNloRqW0SkJ1YctRHLd5f69i2QU2bc6GUIW8zRd+jM8oT:k0jBm6RqR3do8JVf4yi

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.el-rohim.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    3hFb=2niub0P

Targets

    • Target

      16e3b155eaf7d1979f651c9d8212c713.vbs

    • Size

      1.0MB

    • MD5

      16e3b155eaf7d1979f651c9d8212c713

    • SHA1

      1dadee69bc3a2272aa4fee3ccd95ab28f7c212b1

    • SHA256

      9cabd83bf12ccdc253c9bad639a0a7fb32adeb42958107db83bcb873a7821a0e

    • SHA512

      8d7c53cb2a806b9db342e7fe096fccd1c5c210c752ede70efca9838d76dd4ad0e6534747cdf408c794a9d4d89d197de5cf2378b54c7109d73f3c539a6face19b

    • SSDEEP

      12288:kErj1/mNloRqW0SkJ1YctRHLd5f69i2QU2bc6GUIW8zRd+jM8oT:k0jBm6RqR3do8JVf4yi

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks