General

  • Target

    779ea607ed96392c8a6cb72099fd6e80

  • Size

    252KB

  • Sample

    201117-meddvzs27j

  • MD5

    a927d58884bec16e86ab67e660550192

  • SHA1

    1d0573747ef40dff6db14afb19a7c6f8b6cf0054

  • SHA256

    3ee5a54480db0b8a0b2a5c28b04c1f6689945de2a977f5bff91f24e1548a6c7a

  • SHA512

    f9d51e23ba1e52a140e391bba1865d440d20a91c594c18e8327e27c4902289a147efb6e69f9a556adee594470326cd722609aef82da7e9bca8eae788b96ab9ff

Malware Config

Targets

    • Target

      779ea607ed96392c8a6cb72099fd6e80

    • Size

      252KB

    • MD5

      a927d58884bec16e86ab67e660550192

    • SHA1

      1d0573747ef40dff6db14afb19a7c6f8b6cf0054

    • SHA256

      3ee5a54480db0b8a0b2a5c28b04c1f6689945de2a977f5bff91f24e1548a6c7a

    • SHA512

      f9d51e23ba1e52a140e391bba1865d440d20a91c594c18e8327e27c4902289a147efb6e69f9a556adee594470326cd722609aef82da7e9bca8eae788b96ab9ff

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks