General

  • Target

    6e9e765900a37a5118eedf83e492e3cd0f4e60255c450c41c8e7ca92b942b50e.bin.sample.gz

  • Size

    1.5MB

  • Sample

    201204-ms6v84trm2

  • MD5

    d63ff68a26f29dcc3cf92792c3d1ad2a

  • SHA1

    ba717f121caf180e314c658905c61d4651465d42

  • SHA256

    be281e17265ea42cc901e5b6a47270c8b7d6ee662e6a751c7bb50ed3342bf7a8

  • SHA512

    a3fd277adef2d8a8e6193c4f0dcb130629ea0b123db89543546f0869a02a61d7cee06df18ad3a3b2cf4291021edc5366223d8c0da6ec3d268c06cfcec2b8f69f

Malware Config

Targets

    • Target

      sample

    • Size

      1.5MB

    • MD5

      a977133d76993d426e85c68da079e73a

    • SHA1

      fbda809127571078743e26e770196ed4eb094ad1

    • SHA256

      6e9e765900a37a5118eedf83e492e3cd0f4e60255c450c41c8e7ca92b942b50e

    • SHA512

      73c61a18f96a220e731422211e7cb87d3e2116052f0ec92dccd7c5a178ab4ad1a6a2881c49a7ad9a287fb72fb8eddcfcc6431e3f78f9a300b8df8db15bb1be62

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks