General

  • Target

    testzip.zip

  • Size

    1.2MB

  • Sample

    210419-dzvrvmfc7s

  • MD5

    55532234e873d2538e23a5fc4847bd28

  • SHA1

    aa93e479829f77db0fc5a1834f6ec975f866f9fe

  • SHA256

    ae741f6181b1f5da390bad4a6fadfb0191839da4eda69bc05bc6d95cf6955f21

  • SHA512

    44e539183d27e493fdb93ebd90b04bc8b297a0348b871f2e79a99d9165e4c8c276a1cef99fb245c6e24beb94abd9695d610bd052995f3cb27ce2b292527f93fb

Malware Config

Targets

    • Target

      ChromeSetup.exe

    • Size

      1.2MB

    • MD5

      12667c545c3c33a34cd2d5954d631a97

    • SHA1

      571aceaef28b7249cb9c3617bd244cac20a01ddb

    • SHA256

      51c59fcf9fa648bc856665db45480c953763a38ef9a948988b99235b0af149ba

    • SHA512

      754d51039d3c50dc82f38b5cea2af33aaccc75237898d2550898aea85c3ab307a3665780c2e529a116b39faec3fd7f3b4901ad2a89dc44495cce2767e06638b3

    • Registers COM server for autorun

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

3
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks