General

  • Target

    4528ad420104f3571fab85728749d0a952324f9ae23e4cce1f40de71105de34c

  • Size

    225KB

  • Sample

    211019-scr7zsgaf7

  • MD5

    36b6f5b21ceeb841a9049b3e8b80b075

  • SHA1

    0a559466a6780dc50631af10f8039c78623afc1f

  • SHA256

    4528ad420104f3571fab85728749d0a952324f9ae23e4cce1f40de71105de34c

  • SHA512

    c077456bde02b3f3f47fd67ea0e47372f6016e30da2fa225063849631a79dfd5eca931e550e191b6a106155f8bcc3e1f5f89f07fa68176d8c2c5787268f2e585

Malware Config

Targets

    • Target

      4528ad420104f3571fab85728749d0a952324f9ae23e4cce1f40de71105de34c

    • Size

      225KB

    • MD5

      36b6f5b21ceeb841a9049b3e8b80b075

    • SHA1

      0a559466a6780dc50631af10f8039c78623afc1f

    • SHA256

      4528ad420104f3571fab85728749d0a952324f9ae23e4cce1f40de71105de34c

    • SHA512

      c077456bde02b3f3f47fd67ea0e47372f6016e30da2fa225063849631a79dfd5eca931e550e191b6a106155f8bcc3e1f5f89f07fa68176d8c2c5787268f2e585

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks