2beab06a68f9fe2dbe40ae26497b0226293b67acc89d496b6863594dfd023597

General
Target

2beab06a68f9fe2dbe40ae26497b0226293b67acc89d496b6863594dfd023597

Size

102KB

Sample

220520-ra8arafcc9

Score
9 /10
MD5

8c4c1918414c907d3543762c26f66bc4

SHA1

9d0a4749ab597a746d88ee1cfde4d6cb11a20940

SHA256

2beab06a68f9fe2dbe40ae26497b0226293b67acc89d496b6863594dfd023597

SHA512

72fc83dce4bf065faf6dd1e089ed343b6b6f91c1ba0bd99050af7c6d91dd43ff856de8e38a69bd257f33896d54e216a72919776d8e0c1b802c150d084fecc702

Malware Config
Targets
Target

Akt sverki nachalo iyulya.exe

MD5

e35bc27eaa316431da022774ad0b9ab7

Filesize

998KB

Score
7/10
SHA1

9e937f904319dbc8d7d8cdef81119ded0db96093

SHA256

65163c2a5608d66d615a284943d5ebf811a78e6ecebec47835b4680a19d07518

SHA512

9167f11c31cfead7e1b199ce754461ad28563175bba0756e24256992dfaa10c6b136139ac0261551c623e9b23255bd2bde91646d54a928704b8a711cfbb6d21b

Tags

Signatures

  • Deletes itself

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Execution
      Exfiltration
        Impact
          Initial Access
            Lateral Movement
              Persistence
                Privilege Escalation
                  Tasks

                  static1

                  9/10

                  behavioral1

                  7/10

                  behavioral2

                  7/10