General

  • Target

    b536fccbd081bad7330de47c450a1db6c45fe67261e64c338c7ae5e97b301f1e

  • Size

    1.1MB

  • Sample

    211020-ppf4pshhgn

  • MD5

    c6853fe2999d95f65e407f7dada0589a

  • SHA1

    42b9178689687ec0c02106a2ee105546d25005a2

  • SHA256

    b536fccbd081bad7330de47c450a1db6c45fe67261e64c338c7ae5e97b301f1e

  • SHA512

    673f3b36acddf727d3fe986176b4df76c72a980d8905eebba34d5600989ee9a3e67b4279115f9c3687ee582a1fc857b5a76d6f3450d78451281b43aad3517c04

Malware Config

Targets

    • Target

      b536fccbd081bad7330de47c450a1db6c45fe67261e64c338c7ae5e97b301f1e

    • Size

      1.1MB

    • MD5

      c6853fe2999d95f65e407f7dada0589a

    • SHA1

      42b9178689687ec0c02106a2ee105546d25005a2

    • SHA256

      b536fccbd081bad7330de47c450a1db6c45fe67261e64c338c7ae5e97b301f1e

    • SHA512

      673f3b36acddf727d3fe986176b4df76c72a980d8905eebba34d5600989ee9a3e67b4279115f9c3687ee582a1fc857b5a76d6f3450d78451281b43aad3517c04

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks