General

  • Target

    f2e2e785915aa7ed50c91b501b876ac63c331e55ca6bfeee65e7743a8186e5a3

  • Size

    8.4MB

  • Sample

    220508-2ll7rshfa3

  • MD5

    97cd76c1b4ce16f65746997299f7a6ac

  • SHA1

    603f00ff7dcb9598e6cbe4cb27188f6b27667eec

  • SHA256

    f2e2e785915aa7ed50c91b501b876ac63c331e55ca6bfeee65e7743a8186e5a3

  • SHA512

    0a7718dc68d7adfe4ad879cfae95c208ce3c727115ba10b737c9885ca2f2b18ee6bfbc287431a9d751a24452e7c7464620e56c46a80841384cbdc79386480bbc

Malware Config

Targets

    • Target

      f2e2e785915aa7ed50c91b501b876ac63c331e55ca6bfeee65e7743a8186e5a3

    • Size

      8.4MB

    • MD5

      97cd76c1b4ce16f65746997299f7a6ac

    • SHA1

      603f00ff7dcb9598e6cbe4cb27188f6b27667eec

    • SHA256

      f2e2e785915aa7ed50c91b501b876ac63c331e55ca6bfeee65e7743a8186e5a3

    • SHA512

      0a7718dc68d7adfe4ad879cfae95c208ce3c727115ba10b737c9885ca2f2b18ee6bfbc287431a9d751a24452e7c7464620e56c46a80841384cbdc79386480bbc

    • Poullight

      Poullight is an information stealer first seen in March 2020.

    • Poullight Stealer Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks