General

  • Target

    52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80

  • Size

    494KB

  • Sample

    220129-3rewbacbc7

  • MD5

    39e1b41b4118f4ea3ce2119c054b29e8

  • SHA1

    1df78a1dc0aa3382fcc6fac172b70aafd0ed8d3d

  • SHA256

    52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80

  • SHA512

    be221128a83547e0fbab70f1508704ad90dd94b22dab8ad3d502fb74f897dab5f1b4a14f9833cdb0bce7db687daa371a1a17098b4e2f438bb6953828b4684690

Malware Config

Targets

    • Target

      52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80

    • Size

      494KB

    • MD5

      39e1b41b4118f4ea3ce2119c054b29e8

    • SHA1

      1df78a1dc0aa3382fcc6fac172b70aafd0ed8d3d

    • SHA256

      52d1b5387739dcf6a68efb21e8ccf83b9b29fb29724091d7a8084d2315f81d80

    • SHA512

      be221128a83547e0fbab70f1508704ad90dd94b22dab8ad3d502fb74f897dab5f1b4a14f9833cdb0bce7db687daa371a1a17098b4e2f438bb6953828b4684690

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks