General

  • Target

    df105f7f7ad1bb1c08c6caaa5289107e35b6cd0e16d9478f0483e938056d1dff

  • Size

    573KB

  • Sample

    201111-jreq5r6z1n

  • MD5

    d4149099ef37eb8374382bd3f2fe30d0

  • SHA1

    5586d055b19b8f111ea864ed7ce9314fa7bae9f6

  • SHA256

    df105f7f7ad1bb1c08c6caaa5289107e35b6cd0e16d9478f0483e938056d1dff

  • SHA512

    242a544a3db2ad86cf7281f99c1fbaded21d2e853ac01b3ddabf81fff1ee2754b454e2ebdcab99686a52e501fc867de74fcf7d8a4169e10a0fbee95ca31ac7f6

Score
7/10

Malware Config

Targets

    • Target

      df105f7f7ad1bb1c08c6caaa5289107e35b6cd0e16d9478f0483e938056d1dff

    • Size

      573KB

    • MD5

      d4149099ef37eb8374382bd3f2fe30d0

    • SHA1

      5586d055b19b8f111ea864ed7ce9314fa7bae9f6

    • SHA256

      df105f7f7ad1bb1c08c6caaa5289107e35b6cd0e16d9478f0483e938056d1dff

    • SHA512

      242a544a3db2ad86cf7281f99c1fbaded21d2e853ac01b3ddabf81fff1ee2754b454e2ebdcab99686a52e501fc867de74fcf7d8a4169e10a0fbee95ca31ac7f6

    Score
    7/10
    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks