General

  • Target

    a82d1802eb59a28372c3510c846cf1259632abba10b4b7bbcb31ec3c4b66570f

  • Size

    6.5MB

  • Sample

    250201-k6n4eswkhx

  • MD5

    c216934329bd42dddc1f1c58d2418701

  • SHA1

    e7c00eb7a5ee3ff78ae6fc4638b4c700cc1918e9

  • SHA256

    a82d1802eb59a28372c3510c846cf1259632abba10b4b7bbcb31ec3c4b66570f

  • SHA512

    113e003c46816a35f6bbcdf5c9fb20458b64b310efd8707bb9f4ac962c504b7ae9b951a51fe74a691ff1b063b2269939fb967701feb9266f5357891119670c11

  • SSDEEP

    98304:Yi11l1H1Ed66rJmx75Io9no8QhS7CkIohRjM:Y6D1mQz9obCIo0

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    107.151.248.119
  • Port:
    21
  • Username:
    yemao
  • Password:
    yemao

Targets

    • Target

      a82d1802eb59a28372c3510c846cf1259632abba10b4b7bbcb31ec3c4b66570f

    • Size

      6.5MB

    • MD5

      c216934329bd42dddc1f1c58d2418701

    • SHA1

      e7c00eb7a5ee3ff78ae6fc4638b4c700cc1918e9

    • SHA256

      a82d1802eb59a28372c3510c846cf1259632abba10b4b7bbcb31ec3c4b66570f

    • SHA512

      113e003c46816a35f6bbcdf5c9fb20458b64b310efd8707bb9f4ac962c504b7ae9b951a51fe74a691ff1b063b2269939fb967701feb9266f5357891119670c11

    • SSDEEP

      98304:Yi11l1H1Ed66rJmx75Io9no8QhS7CkIohRjM:Y6D1mQz9obCIo0

    • An open source browser data exporter written in golang.

    • HackBrowserData

      An open source golang web browser extractor.

    • Hackbrowserdata family

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks