General

  • Target

    ad2b6de5fb2ee29b62d3a71195beffd1

  • Size

    539KB

  • Sample

    201117-w4maatns26

  • MD5

    68f41a4a60a3c9d33cf4a4e07a4e524d

  • SHA1

    ff73c1abcbd73179020d3e4d2013137936ed48e2

  • SHA256

    7d75e67add3d3ea32c9b6dbdc8f9debb87039dec036bb5c01140bb3dc4dea10a

  • SHA512

    7c8c75d2b0cb3cfe5ec6a03142d41e4ece453dcec7b461d13036d096a10c8813d36c29514bdaaf6959e6effe156a4ab1eeb3ddd8b5177f25a099ad98bf2c6dad

Score
7/10

Malware Config

Targets

    • Target

      ad2b6de5fb2ee29b62d3a71195beffd1

    • Size

      539KB

    • MD5

      68f41a4a60a3c9d33cf4a4e07a4e524d

    • SHA1

      ff73c1abcbd73179020d3e4d2013137936ed48e2

    • SHA256

      7d75e67add3d3ea32c9b6dbdc8f9debb87039dec036bb5c01140bb3dc4dea10a

    • SHA512

      7c8c75d2b0cb3cfe5ec6a03142d41e4ece453dcec7b461d13036d096a10c8813d36c29514bdaaf6959e6effe156a4ab1eeb3ddd8b5177f25a099ad98bf2c6dad

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks