General

  • Target

    2beab06a68f9fe2dbe40ae26497b0226293b67acc89d496b6863594dfd023597

  • Size

    102KB

  • Sample

    220520-ra8arafcc9

  • MD5

    8c4c1918414c907d3543762c26f66bc4

  • SHA1

    9d0a4749ab597a746d88ee1cfde4d6cb11a20940

  • SHA256

    2beab06a68f9fe2dbe40ae26497b0226293b67acc89d496b6863594dfd023597

  • SHA512

    72fc83dce4bf065faf6dd1e089ed343b6b6f91c1ba0bd99050af7c6d91dd43ff856de8e38a69bd257f33896d54e216a72919776d8e0c1b802c150d084fecc702

Malware Config

Targets

    • Target

      Akt sverki nachalo iyulya.exe

    • Size

      998KB

    • MD5

      e35bc27eaa316431da022774ad0b9ab7

    • SHA1

      9e937f904319dbc8d7d8cdef81119ded0db96093

    • SHA256

      65163c2a5608d66d615a284943d5ebf811a78e6ecebec47835b4680a19d07518

    • SHA512

      9167f11c31cfead7e1b199ce754461ad28563175bba0756e24256992dfaa10c6b136139ac0261551c623e9b23255bd2bde91646d54a928704b8a711cfbb6d21b

    Score
    7/10
    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks