General

  • Target

    8fc55d26a11fadf12061e181334012ff25db3bc26ce40adb5b4d126a54985a79

  • Size

    415KB

  • Sample

    220521-snbdlshhb3

  • MD5

    9acd9d92a4128a29fea83ace6a113132

  • SHA1

    bc9fff63eb5fbe0ce051bf519f9165e3f44cc777

  • SHA256

    8fc55d26a11fadf12061e181334012ff25db3bc26ce40adb5b4d126a54985a79

  • SHA512

    b358d80e371b352c47256c4881db09167b3c9b056c45eed4a095a6fdde409106f3fc25a498ffe3640e3e286c02479c9201a5130aa2da0b8f1686fb5d029f5424

Malware Config

Targets

    • Target

      8fc55d26a11fadf12061e181334012ff25db3bc26ce40adb5b4d126a54985a79

    • Size

      415KB

    • MD5

      9acd9d92a4128a29fea83ace6a113132

    • SHA1

      bc9fff63eb5fbe0ce051bf519f9165e3f44cc777

    • SHA256

      8fc55d26a11fadf12061e181334012ff25db3bc26ce40adb5b4d126a54985a79

    • SHA512

      b358d80e371b352c47256c4881db09167b3c9b056c45eed4a095a6fdde409106f3fc25a498ffe3640e3e286c02479c9201a5130aa2da0b8f1686fb5d029f5424

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks