General

  • Target

    39ce4d326c146f915db4dc1193c1769b551473e3f5c7a211cc287bb0c50e0614

  • Size

    403KB

  • Sample

    220520-3nsb8shca8

  • MD5

    7b14a66b08d68be48ee440e519a6e823

  • SHA1

    74a5709d1704574b8a8aff95e5ca1a7fe55b9259

  • SHA256

    39ce4d326c146f915db4dc1193c1769b551473e3f5c7a211cc287bb0c50e0614

  • SHA512

    c4b2bfb426adf7ec56043300d5fe87ca3b6f2203f9bcc9dc4346e0b44a87bf9a1b702e5d851dcb22ede5b36b990f8bfad97b7410500800ffc93bc7f4758dd54f

Malware Config

Targets

    • Target

      39ce4d326c146f915db4dc1193c1769b551473e3f5c7a211cc287bb0c50e0614

    • Size

      403KB

    • MD5

      7b14a66b08d68be48ee440e519a6e823

    • SHA1

      74a5709d1704574b8a8aff95e5ca1a7fe55b9259

    • SHA256

      39ce4d326c146f915db4dc1193c1769b551473e3f5c7a211cc287bb0c50e0614

    • SHA512

      c4b2bfb426adf7ec56043300d5fe87ca3b6f2203f9bcc9dc4346e0b44a87bf9a1b702e5d851dcb22ede5b36b990f8bfad97b7410500800ffc93bc7f4758dd54f

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks