General

  • Target

    046d664c5ed7f8bab938bc3709e328c3.exe

  • Size

    346KB

  • Sample

    210421-pec4s83fse

  • MD5

    046d664c5ed7f8bab938bc3709e328c3

  • SHA1

    76b7226474b83973c8104ead1743ee9240e42e3d

  • SHA256

    828286a465b64587f2cfdb7b10319fca29c9a6b8c6903edc26044edca78e69ed

  • SHA512

    5629b784bc51695d40f5af3bb0270e601a2692fdeee973841dfbdf14ab28245caba3848d36947dbfbb45e391e5fac0d862a751658e9fae5e7084c0bd48bfaa5c

Malware Config

Targets

    • Target

      046d664c5ed7f8bab938bc3709e328c3.exe

    • Size

      346KB

    • MD5

      046d664c5ed7f8bab938bc3709e328c3

    • SHA1

      76b7226474b83973c8104ead1743ee9240e42e3d

    • SHA256

      828286a465b64587f2cfdb7b10319fca29c9a6b8c6903edc26044edca78e69ed

    • SHA512

      5629b784bc51695d40f5af3bb0270e601a2692fdeee973841dfbdf14ab28245caba3848d36947dbfbb45e391e5fac0d862a751658e9fae5e7084c0bd48bfaa5c

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks