General

  • Target

    3f5236a82af731f886881c3e9abafe621e40b481b220f0b7639387860f795c16

  • Size

    441KB

  • Sample

    201114-16twazvpja

  • MD5

    c49b4fbb5752d8e6d6b97caedee4c6d4

  • SHA1

    a74bc5f003b127cd5b35e76d6484244f3afafb6e

  • SHA256

    3f5236a82af731f886881c3e9abafe621e40b481b220f0b7639387860f795c16

  • SHA512

    f07b9b4e8c95a62ba0ea42b362b39003bce67b23cd76529cf2fe3063a8003ebcf1a4c863a922dea5282e51fdb64bc35128d861511f266295a29d4cf02253cddc

Score
7/10

Malware Config

Targets

    • Target

      3f5236a82af731f886881c3e9abafe621e40b481b220f0b7639387860f795c16

    • Size

      441KB

    • MD5

      c49b4fbb5752d8e6d6b97caedee4c6d4

    • SHA1

      a74bc5f003b127cd5b35e76d6484244f3afafb6e

    • SHA256

      3f5236a82af731f886881c3e9abafe621e40b481b220f0b7639387860f795c16

    • SHA512

      f07b9b4e8c95a62ba0ea42b362b39003bce67b23cd76529cf2fe3063a8003ebcf1a4c863a922dea5282e51fdb64bc35128d861511f266295a29d4cf02253cddc

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks