General

  • Target

    812804c3d424a60f3f24eb743ca555d9e022436e139bab8cc6f2ceb3382a0b80

  • Size

    213KB

  • Sample

    210513-42rbfpg4we

  • MD5

    b9a51b09291f4b33c6301070e9ab8360

  • SHA1

    4c493b8a46f9ded53cb7b8e2edc80eb4db0928ae

  • SHA256

    812804c3d424a60f3f24eb743ca555d9e022436e139bab8cc6f2ceb3382a0b80

  • SHA512

    f3a468a8983c40762e1ffa1560d36605bfe94b63e53e4241baa4c575a220acd7be21d90266407df0e46f08eaf6f0a6a8bf7abecf1d3afca480ce6bc6cd44239f

Score
8/10

Malware Config

Targets

    • Target

      812804c3d424a60f3f24eb743ca555d9e022436e139bab8cc6f2ceb3382a0b80

    • Size

      213KB

    • MD5

      b9a51b09291f4b33c6301070e9ab8360

    • SHA1

      4c493b8a46f9ded53cb7b8e2edc80eb4db0928ae

    • SHA256

      812804c3d424a60f3f24eb743ca555d9e022436e139bab8cc6f2ceb3382a0b80

    • SHA512

      f3a468a8983c40762e1ffa1560d36605bfe94b63e53e4241baa4c575a220acd7be21d90266407df0e46f08eaf6f0a6a8bf7abecf1d3afca480ce6bc6cd44239f

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks