General

  • Target

    f11fdfc926699e7d517c6ec814c00c733363a6085a76de11d127d6168081369c

  • Size

    424KB

  • Sample

    201117-8lfvqtbcbx

  • MD5

    9c6ff2e879267a87598f51bbb8496df2

  • SHA1

    2822dc4cd859662f64db9f620ab04767ca6f9872

  • SHA256

    f11fdfc926699e7d517c6ec814c00c733363a6085a76de11d127d6168081369c

  • SHA512

    a8a2c538331e4e064a897ac3a45f482ac1d579589990c6cb0741f586d6929364ce6a34908a50676f053fa14708041e014c020649054e17722da0c9d8a370efa4

Score
7/10

Malware Config

Targets

    • Target

      f11fdfc926699e7d517c6ec814c00c733363a6085a76de11d127d6168081369c

    • Size

      424KB

    • MD5

      9c6ff2e879267a87598f51bbb8496df2

    • SHA1

      2822dc4cd859662f64db9f620ab04767ca6f9872

    • SHA256

      f11fdfc926699e7d517c6ec814c00c733363a6085a76de11d127d6168081369c

    • SHA512

      a8a2c538331e4e064a897ac3a45f482ac1d579589990c6cb0741f586d6929364ce6a34908a50676f053fa14708041e014c020649054e17722da0c9d8a370efa4

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks