General

  • Target

    2c5f392767feced770b37fce6b66c1863daab36a716b07f25c5bef0eeafc0b26.bin

  • Size

    212KB

  • Sample

    200719-mn5l5a2xl2

  • MD5

    9cef7d0c4aa5693c97939b6c8ccccdc3

  • SHA1

    f94f2d4c520d76ad2318b0bde528ec39a619cb13

  • SHA256

    2c5f392767feced770b37fce6b66c1863daab36a716b07f25c5bef0eeafc0b26

  • SHA512

    1521ac18a9b22b05e8436c4c3166f7236829bf3294ff312bb023214e3e5a1adcfc7b1994a30176bb504fcb3811b3bee403f3a54634f68238ba2bb5775b1eee81

Score
7/10

Malware Config

Targets

    • Target

      2c5f392767feced770b37fce6b66c1863daab36a716b07f25c5bef0eeafc0b26.bin

    • Size

      212KB

    • MD5

      9cef7d0c4aa5693c97939b6c8ccccdc3

    • SHA1

      f94f2d4c520d76ad2318b0bde528ec39a619cb13

    • SHA256

      2c5f392767feced770b37fce6b66c1863daab36a716b07f25c5bef0eeafc0b26

    • SHA512

      1521ac18a9b22b05e8436c4c3166f7236829bf3294ff312bb023214e3e5a1adcfc7b1994a30176bb504fcb3811b3bee403f3a54634f68238ba2bb5775b1eee81

    Score
    7/10
    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks