General

  • Target

    10d94abd5900b4658aee2a6e4f66fa97bde81047ccac8340d78fae45711f10e4

  • Size

    2.7MB

  • Sample

    220521-r4sr6ahgb3

  • MD5

    07c8ceffcfe28cc6c365d88434861190

  • SHA1

    9689fd3c8ab8650927fa43e605db5eceb378f81c

  • SHA256

    10d94abd5900b4658aee2a6e4f66fa97bde81047ccac8340d78fae45711f10e4

  • SHA512

    d2f03fbc709da64b3f8f9291c6fc77eeb3c1ca829c84d184df56f2e28ea1eb4a5a93b059dd5147158e5705e11e456d55b5ef631fe788e1ccc843fd7ac7c716c1

Malware Config

Targets

    • Target

      10d94abd5900b4658aee2a6e4f66fa97bde81047ccac8340d78fae45711f10e4

    • Size

      2.7MB

    • MD5

      07c8ceffcfe28cc6c365d88434861190

    • SHA1

      9689fd3c8ab8650927fa43e605db5eceb378f81c

    • SHA256

      10d94abd5900b4658aee2a6e4f66fa97bde81047ccac8340d78fae45711f10e4

    • SHA512

      d2f03fbc709da64b3f8f9291c6fc77eeb3c1ca829c84d184df56f2e28ea1eb4a5a93b059dd5147158e5705e11e456d55b5ef631fe788e1ccc843fd7ac7c716c1

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks