General

  • Target

    ffb2605674ae69ecb24d0c3614117e7a3c8207b985d66330a6e6b656d44a175a

  • Size

    217KB

  • Sample

    211022-wxlgqabhf9

  • MD5

    19089d8f5fb2ce7b4615059cba246b22

  • SHA1

    f2c143e5351a6900a2cecca9e89346610ca27be5

  • SHA256

    ffb2605674ae69ecb24d0c3614117e7a3c8207b985d66330a6e6b656d44a175a

  • SHA512

    9162ec7d494327bbf5ddbf977d1a5a7910dfeeab7c7e509237ba9be66bcf25a9f9961190133b44eecf55ff547a25954342ce2eed4c2866c2fe0bc6c3136bbb7c

Malware Config

Targets

    • Target

      ffb2605674ae69ecb24d0c3614117e7a3c8207b985d66330a6e6b656d44a175a

    • Size

      217KB

    • MD5

      19089d8f5fb2ce7b4615059cba246b22

    • SHA1

      f2c143e5351a6900a2cecca9e89346610ca27be5

    • SHA256

      ffb2605674ae69ecb24d0c3614117e7a3c8207b985d66330a6e6b656d44a175a

    • SHA512

      9162ec7d494327bbf5ddbf977d1a5a7910dfeeab7c7e509237ba9be66bcf25a9f9961190133b44eecf55ff547a25954342ce2eed4c2866c2fe0bc6c3136bbb7c

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks