General

  • Target

    34cc348b9fa48a35e10b1c1333ce9fc63aefca3e06983b31f7f01ad8af3996d1

  • Size

    1.1MB

  • Sample

    220520-wkla7aecfl

  • MD5

    06e5c0fde2cd7ee930b1049831cf8da8

  • SHA1

    fa2350fc18cdf1f934bb8fc625578c6c38e33728

  • SHA256

    34cc348b9fa48a35e10b1c1333ce9fc63aefca3e06983b31f7f01ad8af3996d1

  • SHA512

    751868ec358664e3b167b6c48daae7b1682cc67c944adea8d1d825520877eeafa8feeefb09d7f21760f00b7073d7606bd9fcbd305d9c06f99df988802a354323

Malware Config

Targets

    • Target

      34cc348b9fa48a35e10b1c1333ce9fc63aefca3e06983b31f7f01ad8af3996d1

    • Size

      1.1MB

    • MD5

      06e5c0fde2cd7ee930b1049831cf8da8

    • SHA1

      fa2350fc18cdf1f934bb8fc625578c6c38e33728

    • SHA256

      34cc348b9fa48a35e10b1c1333ce9fc63aefca3e06983b31f7f01ad8af3996d1

    • SHA512

      751868ec358664e3b167b6c48daae7b1682cc67c944adea8d1d825520877eeafa8feeefb09d7f21760f00b7073d7606bd9fcbd305d9c06f99df988802a354323

    • Poullight

      Poullight is an information stealer first seen in March 2020.

    • Poullight Stealer Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks