General

  • Target

    2914f4572a8dc8dcd8cf8a871018792c91d4a002c9775ea4138e26aff590943e

  • Size

    379KB

  • Sample

    220514-qm4yescbgj

  • MD5

    92896ebe236ea2ee9c6ea8073b61efab

  • SHA1

    d660ce88dbf49a8bb67917426d2cf48b8274e476

  • SHA256

    2914f4572a8dc8dcd8cf8a871018792c91d4a002c9775ea4138e26aff590943e

  • SHA512

    8e185d26c715971ea1ef612d829ffd9ddbabbe2b72cd506d5af682c616f0fe9371b4be6f82bffb7585212174537acb8b5d4ffd032f235a79191ec37f9443b96a

Malware Config

Targets

    • Target

      2914f4572a8dc8dcd8cf8a871018792c91d4a002c9775ea4138e26aff590943e

    • Size

      379KB

    • MD5

      92896ebe236ea2ee9c6ea8073b61efab

    • SHA1

      d660ce88dbf49a8bb67917426d2cf48b8274e476

    • SHA256

      2914f4572a8dc8dcd8cf8a871018792c91d4a002c9775ea4138e26aff590943e

    • SHA512

      8e185d26c715971ea1ef612d829ffd9ddbabbe2b72cd506d5af682c616f0fe9371b4be6f82bffb7585212174537acb8b5d4ffd032f235a79191ec37f9443b96a

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks