General

  • Target

    1d5ffeb1da527fbfd44702f9c14df678.exe

  • Size

    441KB

  • Sample

    200712-cylv7239r6

  • MD5

    1d5ffeb1da527fbfd44702f9c14df678

  • SHA1

    623e746ea70afd4cbed10e335effb34fd4291c6b

  • SHA256

    5275eb92b2b285585e26a85d14c9415e42fc4eac7c8b482e22910effb85536c5

  • SHA512

    b7dae15a2d203ba7b149e019717c6b7cbda0fb33b4f7714b156965cbaf20eaa3dcd58ef7b8a1165df8c9e760f706f13206b6c1789a2679fbe8ca03cc7f51d321

Score
7/10

Malware Config

Targets

    • Target

      1d5ffeb1da527fbfd44702f9c14df678.exe

    • Size

      441KB

    • MD5

      1d5ffeb1da527fbfd44702f9c14df678

    • SHA1

      623e746ea70afd4cbed10e335effb34fd4291c6b

    • SHA256

      5275eb92b2b285585e26a85d14c9415e42fc4eac7c8b482e22910effb85536c5

    • SHA512

      b7dae15a2d203ba7b149e019717c6b7cbda0fb33b4f7714b156965cbaf20eaa3dcd58ef7b8a1165df8c9e760f706f13206b6c1789a2679fbe8ca03cc7f51d321

    Score
    7/10
    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for installed software on the system

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks