https://1drv.ms/u/s!AlA0pbYwD0JUbpku6hERsshTUjw?e=EOKOsf

General
Target

https://1drv.ms/u/s!AlA0pbYwD0JUbpku6hERsshTUjw?e=EOKOsf

Sample

210727-hnqbcm8lyj

Score
8 /10
Malware Config
Targets
Target

https://1drv.ms/u/s!AlA0pbYwD0JUbpku6hERsshTUjw?e=EOKOsf

Score
8 /10

Tags

Signatures

  • Executes dropped EXE

  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks

                    static1

                    urlscan1

                    behavioral1

                    8/10