General

  • Target

    e1c6e285620909031d9a6bbc341c609188d38656ecc81d9121bedb4ad59fc9da

  • Size

    1.1MB

  • Sample

    211021-tqnbmaaed5

  • MD5

    52be64290ede5a34c44e26b5d1acf448

  • SHA1

    ec4cd432e37b45e28346100a1c7892d5e21e6e25

  • SHA256

    e1c6e285620909031d9a6bbc341c609188d38656ecc81d9121bedb4ad59fc9da

  • SHA512

    d75e490b1c208ad81b31bd3e8ec71ed5aa7d4c0b9ed6af60cd703ec880a1b9092ecef11054ad5158609349bff069ba45542f009112e04ca8c913d2ba5490c504

Malware Config

Targets

    • Target

      e1c6e285620909031d9a6bbc341c609188d38656ecc81d9121bedb4ad59fc9da

    • Size

      1.1MB

    • MD5

      52be64290ede5a34c44e26b5d1acf448

    • SHA1

      ec4cd432e37b45e28346100a1c7892d5e21e6e25

    • SHA256

      e1c6e285620909031d9a6bbc341c609188d38656ecc81d9121bedb4ad59fc9da

    • SHA512

      d75e490b1c208ad81b31bd3e8ec71ed5aa7d4c0b9ed6af60cd703ec880a1b9092ecef11054ad5158609349bff069ba45542f009112e04ca8c913d2ba5490c504

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks