General

  • Target

    new.dll

  • Size

    1.7MB

  • Sample

    220516-ptxx1sbgb7

  • MD5

    3c3536d8cc085b9cf0863d5f8f36fb3e

  • SHA1

    f44d853379708effa39814d6c9fd35f452d0213e

  • SHA256

    1b4b0c12b9093dbc2702ffd3f2d522b302f14221322c7dc7557ae998023137f3

  • SHA512

    32f62a1da9364d09781058e0e5cce142ead598ba540001d99e41a0701a22ac6cb24a817d8ee27240fbd855c1583a20429e15efd15cdfa1f47b79dae46016e272

Malware Config

Targets

    • Target

      new.dll

    • Size

      1.7MB

    • MD5

      3c3536d8cc085b9cf0863d5f8f36fb3e

    • SHA1

      f44d853379708effa39814d6c9fd35f452d0213e

    • SHA256

      1b4b0c12b9093dbc2702ffd3f2d522b302f14221322c7dc7557ae998023137f3

    • SHA512

      32f62a1da9364d09781058e0e5cce142ead598ba540001d99e41a0701a22ac6cb24a817d8ee27240fbd855c1583a20429e15efd15cdfa1f47b79dae46016e272

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks