General

  • Target

    15877d60d725b49ea79fb8f0341a2b70c795192eba709d0c60b8288394903d85

  • Size

    235KB

  • Sample

    201108-n4dshwzrse

  • MD5

    897385950aad28169556fb8d37b06773

  • SHA1

    3044fd2031c822289cae1cb69ab7bd2efc174d44

  • SHA256

    15877d60d725b49ea79fb8f0341a2b70c795192eba709d0c60b8288394903d85

  • SHA512

    835c0612165d4a10348e24cfbbf5d111058fa73c6c112729c6a9e638f5c9d674e4dddac7c1b68e983182ba213c5eb4bbbae98efb90efe901cce4c597b14dcc4c

Malware Config

Targets

    • Target

      15877d60d725b49ea79fb8f0341a2b70c795192eba709d0c60b8288394903d85

    • Size

      235KB

    • MD5

      897385950aad28169556fb8d37b06773

    • SHA1

      3044fd2031c822289cae1cb69ab7bd2efc174d44

    • SHA256

      15877d60d725b49ea79fb8f0341a2b70c795192eba709d0c60b8288394903d85

    • SHA512

      835c0612165d4a10348e24cfbbf5d111058fa73c6c112729c6a9e638f5c9d674e4dddac7c1b68e983182ba213c5eb4bbbae98efb90efe901cce4c597b14dcc4c

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks