General

  • Target

    c3c4e97a92372bba5299301c96a20a15

  • Size

    2.0MB

  • Sample

    201026-ayveamchls

  • MD5

    c3c4e97a92372bba5299301c96a20a15

  • SHA1

    059ce2d62526a9c4bb1ab81cacb1945fa23a4478

  • SHA256

    e138114de7be8b668de032a3bacf123dc855eead36d2765689c990cf1951771c

  • SHA512

    7eb8b4d87004d0edffd43ef90656d2e805befe3743a626fe60bce11b240959995ba39f5dc15a19e47f34edd9180c9d1d7547df447efaed5fbb72f30ea1007780

Malware Config

Targets

    • Target

      c3c4e97a92372bba5299301c96a20a15

    • Size

      2.0MB

    • MD5

      c3c4e97a92372bba5299301c96a20a15

    • SHA1

      059ce2d62526a9c4bb1ab81cacb1945fa23a4478

    • SHA256

      e138114de7be8b668de032a3bacf123dc855eead36d2765689c990cf1951771c

    • SHA512

      7eb8b4d87004d0edffd43ef90656d2e805befe3743a626fe60bce11b240959995ba39f5dc15a19e47f34edd9180c9d1d7547df447efaed5fbb72f30ea1007780

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks