General

  • Target

    32644bca80e32c4cabe236c15a31aa9538c64349ae8d0a9a9371d9707b71821d

  • Size

    69KB

  • Sample

    211020-my39gshghm

  • MD5

    87809bbb605f9a0446f9f4e289dde0b4

  • SHA1

    9ca27dc11bb6428c47cceb0f62bab494474ff408

  • SHA256

    32644bca80e32c4cabe236c15a31aa9538c64349ae8d0a9a9371d9707b71821d

  • SHA512

    918e8d12c2490b4359212c913894f78c40f596697229c03736d5abb589cf4fc85ae8b917242442a7eae608fdd7e296c00033b606dd8d4c00bcb78b469f993547

Malware Config

Targets

    • Target

      32644bca80e32c4cabe236c15a31aa9538c64349ae8d0a9a9371d9707b71821d

    • Size

      69KB

    • MD5

      87809bbb605f9a0446f9f4e289dde0b4

    • SHA1

      9ca27dc11bb6428c47cceb0f62bab494474ff408

    • SHA256

      32644bca80e32c4cabe236c15a31aa9538c64349ae8d0a9a9371d9707b71821d

    • SHA512

      918e8d12c2490b4359212c913894f78c40f596697229c03736d5abb589cf4fc85ae8b917242442a7eae608fdd7e296c00033b606dd8d4c00bcb78b469f993547

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks