General

  • Target

    payment.exe

  • Size

    437KB

  • Sample

    200630-yfrxktmhvn

  • MD5

    435dee0b278745f125024d035dee61dd

  • SHA1

    7d5fc4b66fafaa341900fffa1ef494973b10703e

  • SHA256

    f2ff168cde9f84daeaa4329a4c62fbaa4682fb257062fe8162fe6da08084cabe

  • SHA512

    fc66bfc4197735bb6dbe7a21eb3c19297b2d1a03f7312a361a444e58b296545e542a5e4d4c0f5361f3a027d71f63a4c8fb956221add39fc4455eca3da7bccb73

Score
7/10

Malware Config

Targets

    • Target

      payment.exe

    • Size

      437KB

    • MD5

      435dee0b278745f125024d035dee61dd

    • SHA1

      7d5fc4b66fafaa341900fffa1ef494973b10703e

    • SHA256

      f2ff168cde9f84daeaa4329a4c62fbaa4682fb257062fe8162fe6da08084cabe

    • SHA512

      fc66bfc4197735bb6dbe7a21eb3c19297b2d1a03f7312a361a444e58b296545e542a5e4d4c0f5361f3a027d71f63a4c8fb956221add39fc4455eca3da7bccb73

    Score
    7/10
    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks