General

  • Target

    1e20978faf83eef6a9d3f22dc7a2e17e.exe

  • Size

    464KB

  • Sample

    200731-x2cmxvenda

  • MD5

    1e20978faf83eef6a9d3f22dc7a2e17e

  • SHA1

    25c2f7e1e00cfaa7ca77d6e92329378af65cd41f

  • SHA256

    3d8567fb3b55c792b8ba70e2172726ae80805f1a1c858db29e13a5cd02d8634a

  • SHA512

    b209cbc0c64c38c57ad6c0b198c035332fb670c7d80c3ff3ac338b96eb7e779e32e3a7bf8e7ee307d1e05106e536eaf72f16d66d0678217a0bb4da0da973ba09

Score
7/10

Malware Config

Targets

    • Target

      1e20978faf83eef6a9d3f22dc7a2e17e.exe

    • Size

      464KB

    • MD5

      1e20978faf83eef6a9d3f22dc7a2e17e

    • SHA1

      25c2f7e1e00cfaa7ca77d6e92329378af65cd41f

    • SHA256

      3d8567fb3b55c792b8ba70e2172726ae80805f1a1c858db29e13a5cd02d8634a

    • SHA512

      b209cbc0c64c38c57ad6c0b198c035332fb670c7d80c3ff3ac338b96eb7e779e32e3a7bf8e7ee307d1e05106e536eaf72f16d66d0678217a0bb4da0da973ba09

    Score
    7/10
    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks