General

  • Target

    3cdabf7e1f553e5c365f0f005af7e264e2957a818cb17dd5abd06a38086bf0d9

  • Size

    772KB

  • Sample

    250117-blnsgsxrhm

  • MD5

    0a2f1ff3910e3718d4bd773520b990c7

  • SHA1

    65ba9766500693a174a9785fbfd22d2892e4469d

  • SHA256

    3cdabf7e1f553e5c365f0f005af7e264e2957a818cb17dd5abd06a38086bf0d9

  • SHA512

    387443240532a3adab5dca5a534c76cdc4d2e0bc6a70378aada08cdbf0d8c7368bddfd4ac108e7102bcaafc3a50ca35b0e3429bb203d52b4250dc20ce813c6bf

  • SSDEEP

    6144:oWusAIFB++velibxPyp/64wjOjn6cB3rZtT/Yq3v9Auky+4N1v9D2O:oz7IFjvelQypyfy7z6u7+4Dv9D2O

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Boy12345#

Targets

    • Target

      3cdabf7e1f553e5c365f0f005af7e264e2957a818cb17dd5abd06a38086bf0d9

    • Size

      772KB

    • MD5

      0a2f1ff3910e3718d4bd773520b990c7

    • SHA1

      65ba9766500693a174a9785fbfd22d2892e4469d

    • SHA256

      3cdabf7e1f553e5c365f0f005af7e264e2957a818cb17dd5abd06a38086bf0d9

    • SHA512

      387443240532a3adab5dca5a534c76cdc4d2e0bc6a70378aada08cdbf0d8c7368bddfd4ac108e7102bcaafc3a50ca35b0e3429bb203d52b4250dc20ce813c6bf

    • SSDEEP

      6144:oWusAIFB++velibxPyp/64wjOjn6cB3rZtT/Yq3v9Auky+4N1v9D2O:oz7IFjvelQypyfy7z6u7+4Dv9D2O

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks