General

  • Target

    a0f1f26dfa145a1e0d273530c17619618fcb09024e7f6f867d4aa96dff4ce29b

  • Size

    407KB

  • Sample

    220521-qbn3tscdbm

  • MD5

    16ba7060655c5102698ed9bc4cd14477

  • SHA1

    a221c5a7bdebbd05cbd933173d9c2a36a505cc9d

  • SHA256

    a0f1f26dfa145a1e0d273530c17619618fcb09024e7f6f867d4aa96dff4ce29b

  • SHA512

    ee693e9f30b5e5f2297911ead841da24065cd2c95e2fff8286c515f06d666d14a0224363ce88de5a62bd6c4f8305f0ba7adf8c9ef3fca35a59787701c111db4c

Malware Config

Targets

    • Target

      a0f1f26dfa145a1e0d273530c17619618fcb09024e7f6f867d4aa96dff4ce29b

    • Size

      407KB

    • MD5

      16ba7060655c5102698ed9bc4cd14477

    • SHA1

      a221c5a7bdebbd05cbd933173d9c2a36a505cc9d

    • SHA256

      a0f1f26dfa145a1e0d273530c17619618fcb09024e7f6f867d4aa96dff4ce29b

    • SHA512

      ee693e9f30b5e5f2297911ead841da24065cd2c95e2fff8286c515f06d666d14a0224363ce88de5a62bd6c4f8305f0ba7adf8c9ef3fca35a59787701c111db4c

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks