General

  • Target

    092eb90ec6565246325340e973c94bba7cf9561ed361dfc4d8b0a4c2f8475f01

  • Size

    225KB

  • Sample

    211020-xw6a6shed9

  • MD5

    fcadbb2e8c865846952370f29a9a0fe0

  • SHA1

    4acf25af822b06f742fc012e1552b10e41c9e3ef

  • SHA256

    092eb90ec6565246325340e973c94bba7cf9561ed361dfc4d8b0a4c2f8475f01

  • SHA512

    7b6b7aab2db492c7eaeafd36d753ba111854679b08779cd6891865156061b416b3a83b9f85f10928e0ed1c1254cb284026e15aefd9d3d271d4471175abf29cb9

Malware Config

Targets

    • Target

      092eb90ec6565246325340e973c94bba7cf9561ed361dfc4d8b0a4c2f8475f01

    • Size

      225KB

    • MD5

      fcadbb2e8c865846952370f29a9a0fe0

    • SHA1

      4acf25af822b06f742fc012e1552b10e41c9e3ef

    • SHA256

      092eb90ec6565246325340e973c94bba7cf9561ed361dfc4d8b0a4c2f8475f01

    • SHA512

      7b6b7aab2db492c7eaeafd36d753ba111854679b08779cd6891865156061b416b3a83b9f85f10928e0ed1c1254cb284026e15aefd9d3d271d4471175abf29cb9

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks