General

  • Target

    c45f757fc880b6135d9922abf574929b2150ba3d6769e6c0b879f78dbf243351

  • Size

    1.3MB

  • Sample

    210504-lrs2111ena

  • MD5

    d416a329997101c4b53e87ab32ab4068

  • SHA1

    77079432fb9c6e28ff88614747153821cb5f7d14

  • SHA256

    c45f757fc880b6135d9922abf574929b2150ba3d6769e6c0b879f78dbf243351

  • SHA512

    fcc6896d62c7a4c72ccfe344bd4511bad6fabe36999d6dc1e04bfef8ddda8ff3c3968d3cd149f9d8b8b38dee70d8f10dbafa0ed9d6cf9b04addcf7893c37db31

Malware Config

Targets

    • Target

      c45f757fc880b6135d9922abf574929b2150ba3d6769e6c0b879f78dbf243351

    • Size

      1.3MB

    • MD5

      d416a329997101c4b53e87ab32ab4068

    • SHA1

      77079432fb9c6e28ff88614747153821cb5f7d14

    • SHA256

      c45f757fc880b6135d9922abf574929b2150ba3d6769e6c0b879f78dbf243351

    • SHA512

      fcc6896d62c7a4c72ccfe344bd4511bad6fabe36999d6dc1e04bfef8ddda8ff3c3968d3cd149f9d8b8b38dee70d8f10dbafa0ed9d6cf9b04addcf7893c37db31

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks