General

  • Target

    bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24.bin

  • Size

    366KB

  • Sample

    220112-wf4a7sddh2

  • MD5

    e69294040dab044805c9d7c47fef4844

  • SHA1

    f3a2731e174a68d13b4ae15fab2d7b2788517039

  • SHA256

    bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24

  • SHA512

    c1a7bc64f9edf804ef7707dd717e7f8d293a607a96b9339e4acf2fdee1b70c643c1987016882620654c709795775042db9461da11cd4b1a016ea98fcd8e20a8c

Malware Config

Targets

    • Target

      bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24.bin

    • Size

      366KB

    • MD5

      e69294040dab044805c9d7c47fef4844

    • SHA1

      f3a2731e174a68d13b4ae15fab2d7b2788517039

    • SHA256

      bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24

    • SHA512

      c1a7bc64f9edf804ef7707dd717e7f8d293a607a96b9339e4acf2fdee1b70c643c1987016882620654c709795775042db9461da11cd4b1a016ea98fcd8e20a8c

    • GoldDragon

      GoldDragon is a second-stage backdoor attributed to Kimsuky.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks