General

  • Target

    cb913fe4fb5cec0cc979dd246567210b54cea7595180ea2b01c81c0d56b3e011

  • Size

    393KB

  • Sample

    201114-h2wlhfrer2

  • MD5

    0ae59db6acc628cc24efdfbe2ffc4c4a

  • SHA1

    bc9e6431fee419d2424a0954ee38bb80749630ef

  • SHA256

    cb913fe4fb5cec0cc979dd246567210b54cea7595180ea2b01c81c0d56b3e011

  • SHA512

    5362df69f4dc7df01b8e115ec5a416438ba76ea72703a5f5cd162f8032a472712d4668213c53b1f8f11b139720910253be8e91ef44a2a80fe93b23b86d3a640f

Score
7/10

Malware Config

Targets

    • Target

      cb913fe4fb5cec0cc979dd246567210b54cea7595180ea2b01c81c0d56b3e011

    • Size

      393KB

    • MD5

      0ae59db6acc628cc24efdfbe2ffc4c4a

    • SHA1

      bc9e6431fee419d2424a0954ee38bb80749630ef

    • SHA256

      cb913fe4fb5cec0cc979dd246567210b54cea7595180ea2b01c81c0d56b3e011

    • SHA512

      5362df69f4dc7df01b8e115ec5a416438ba76ea72703a5f5cd162f8032a472712d4668213c53b1f8f11b139720910253be8e91ef44a2a80fe93b23b86d3a640f

    Score
    7/10
    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks