General

  • Target

    83b4d1800d8d91536cfef0e1859bba535511d8f33937acb12d2065b5a246c382

  • Size

    515KB

  • Sample

    220328-vxpnpsggfr

  • MD5

    f2d7ffe4f989d68b3a862072d5cc7149

  • SHA1

    eb63becb7cc2bd74e785d65e7dedec2308e310a2

  • SHA256

    83b4d1800d8d91536cfef0e1859bba535511d8f33937acb12d2065b5a246c382

  • SHA512

    2967e2cfc4b759980a8a40ddd02eea0b815649f223fbdf15959b18b11adbfe0893afcdd391e83e807f9b378f15802738c3ab3223eef828253b47719f471b999f

Malware Config

Targets

    • Target

      83b4d1800d8d91536cfef0e1859bba535511d8f33937acb12d2065b5a246c382

    • Size

      515KB

    • MD5

      f2d7ffe4f989d68b3a862072d5cc7149

    • SHA1

      eb63becb7cc2bd74e785d65e7dedec2308e310a2

    • SHA256

      83b4d1800d8d91536cfef0e1859bba535511d8f33937acb12d2065b5a246c382

    • SHA512

      2967e2cfc4b759980a8a40ddd02eea0b815649f223fbdf15959b18b11adbfe0893afcdd391e83e807f9b378f15802738c3ab3223eef828253b47719f471b999f

    • Poullight

      Poullight is an information stealer first seen in March 2020.

    • Poullight Stealer Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks