General

  • Target

    Purchase Order and Sample Drawings.exe

  • Size

    821KB

  • Sample

    200630-hp8bmp8x1x

  • MD5

    3b366485eba8147bf73fc3020d09c947

  • SHA1

    8ddbf9383d58c23a93ec8a24ec77a432ec3d63ac

  • SHA256

    fe7dc35391c88f2001b6637186c2fa677bb5f1a08cfdafcfc95a1e1fc2f026a9

  • SHA512

    b65af6b653626d15208ac66207b44c045b2869ce3c1a1f8214a128e0e204507fc4ab2aa3b3ec288f197cd3081eb4f9ae4eabdf870c2d5980457a559e6bcdf04c

Score
8/10

Malware Config

Targets

    • Target

      Purchase Order and Sample Drawings.exe

    • Size

      821KB

    • MD5

      3b366485eba8147bf73fc3020d09c947

    • SHA1

      8ddbf9383d58c23a93ec8a24ec77a432ec3d63ac

    • SHA256

      fe7dc35391c88f2001b6637186c2fa677bb5f1a08cfdafcfc95a1e1fc2f026a9

    • SHA512

      b65af6b653626d15208ac66207b44c045b2869ce3c1a1f8214a128e0e204507fc4ab2aa3b3ec288f197cd3081eb4f9ae4eabdf870c2d5980457a559e6bcdf04c

    Score
    8/10
    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run entry to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks