General

  • Target

    MT103-Swift.exe

  • Size

    332KB

  • Sample

    200713-l3jjpzthzx

  • MD5

    ff143f71d0e4587e2f48989ef1f0299d

  • SHA1

    7e73614061675f7862de68bc74dbcbafde02f487

  • SHA256

    95035a7201b03830ecb4d63aca8288e276a5cd7236a164d5df7290f7b2123148

  • SHA512

    6d1bc2138730da8d344226841c5dee242889b6acc05c61b30b57518333492968c7019498e1cf1221d524b9e22bb9336ee74cc43779442050bfbeafbc440834bf

Malware Config

Targets

    • Target

      MT103-Swift.exe

    • Size

      332KB

    • MD5

      ff143f71d0e4587e2f48989ef1f0299d

    • SHA1

      7e73614061675f7862de68bc74dbcbafde02f487

    • SHA256

      95035a7201b03830ecb4d63aca8288e276a5cd7236a164d5df7290f7b2123148

    • SHA512

      6d1bc2138730da8d344226841c5dee242889b6acc05c61b30b57518333492968c7019498e1cf1221d524b9e22bb9336ee74cc43779442050bfbeafbc440834bf

    • Adds Run entry to policy start application

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run entry to start application

    • Checks whether UAC is enabled

    • js

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks