General

  • Target

    a233b4b4782811424b0b5b166b0985417e834da2b776e72d3c7e5064dee1e9e5

  • Size

    970KB

  • Sample

    220113-mgp1jahde7

  • MD5

    6e0fc3d593968917c8ed6ea577195296

  • SHA1

    b0225393df8ed257ade0d6cb95ca14f0a92f4ea4

  • SHA256

    a233b4b4782811424b0b5b166b0985417e834da2b776e72d3c7e5064dee1e9e5

  • SHA512

    1e92bc275a185c7faa4db5b02aef12f14d30389f0daa4951a1866cf789964eedd30e272016906f8037f27d2cd62bfa3c63ff7433752a7d78187b80d08d8f8503

Malware Config

Targets

    • Target

      a233b4b4782811424b0b5b166b0985417e834da2b776e72d3c7e5064dee1e9e5

    • Size

      970KB

    • MD5

      6e0fc3d593968917c8ed6ea577195296

    • SHA1

      b0225393df8ed257ade0d6cb95ca14f0a92f4ea4

    • SHA256

      a233b4b4782811424b0b5b166b0985417e834da2b776e72d3c7e5064dee1e9e5

    • SHA512

      1e92bc275a185c7faa4db5b02aef12f14d30389f0daa4951a1866cf789964eedd30e272016906f8037f27d2cd62bfa3c63ff7433752a7d78187b80d08d8f8503

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks