General

  • Target

    a2ed1d69dbbc9d342a1f5a1d3d6c67b99f81e2f648557c5c0424d69e9bfbce66

  • Size

    194KB

  • Sample

    201108-eylfarfgbj

  • MD5

    26b1b7280ff792f31759deae431f4d18

  • SHA1

    57d9852c0ce6894fe020062901e7b1cef96a8558

  • SHA256

    a2ed1d69dbbc9d342a1f5a1d3d6c67b99f81e2f648557c5c0424d69e9bfbce66

  • SHA512

    14e2446ab408d1a73228a060a26381cbf75982b2ad99f33988f6308dbd6cfa83960728e4632d42a1a4ca3d71643cc73a6cb4fa2bbfb45780c413c9979a25161c

Malware Config

Targets

    • Target

      a2ed1d69dbbc9d342a1f5a1d3d6c67b99f81e2f648557c5c0424d69e9bfbce66

    • Size

      194KB

    • MD5

      26b1b7280ff792f31759deae431f4d18

    • SHA1

      57d9852c0ce6894fe020062901e7b1cef96a8558

    • SHA256

      a2ed1d69dbbc9d342a1f5a1d3d6c67b99f81e2f648557c5c0424d69e9bfbce66

    • SHA512

      14e2446ab408d1a73228a060a26381cbf75982b2ad99f33988f6308dbd6cfa83960728e4632d42a1a4ca3d71643cc73a6cb4fa2bbfb45780c413c9979a25161c

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks