General

  • Target

    UNGO PAYMENT FORM08656049_DOC.exe

  • Size

    831KB

  • Sample

    200709-s7c1ec7wes

  • MD5

    5310d3ed86e4e68a0d657ed3bb30acd5

  • SHA1

    a4d46ab83ac7e30492b061e4ac95b9f5dd2e8905

  • SHA256

    dea3774e5c5ae207131be64dec69219c8e0274ee90efc6914ceaedf551f255c6

  • SHA512

    1768202776abb2bfccc2efcaa1024c46ca20f83d3e87fdb9739c03f838ff48df52241134fdd68376c8fe644492271d3f6366edff6ae9c3fb848cb593a0145dce

Malware Config

Targets

    • Target

      UNGO PAYMENT FORM08656049_DOC.exe

    • Size

      831KB

    • MD5

      5310d3ed86e4e68a0d657ed3bb30acd5

    • SHA1

      a4d46ab83ac7e30492b061e4ac95b9f5dd2e8905

    • SHA256

      dea3774e5c5ae207131be64dec69219c8e0274ee90efc6914ceaedf551f255c6

    • SHA512

      1768202776abb2bfccc2efcaa1024c46ca20f83d3e87fdb9739c03f838ff48df52241134fdd68376c8fe644492271d3f6366edff6ae9c3fb848cb593a0145dce

    • Adds Run entry to policy start application

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks