e0109e0fb908d09db12eaf8b9fd08525a25d5941a9ab9da0d730c51e4185a39c

General
Target

e0109e0fb908d09db12eaf8b9fd08525a25d5941a9ab9da0d730c51e4185a39c

Size

407KB

Sample

220521-t8sn3aaca5

Score
7 /10
MD5

ccfaf8678bfe1ecd0a4dc16d225195f4

SHA1

90f58e42214bafea1e0825d181b915ec3c7304c3

SHA256

e0109e0fb908d09db12eaf8b9fd08525a25d5941a9ab9da0d730c51e4185a39c

SHA512

991277fffa77b3488e06255e5c0b9572cbd18b3f7320cc2efc96d43736883cc9c84ce403dc204316dc93be3088ed9d7f057b798835f364313a5f55b3e113f9e1

Malware Config
Targets
Target

e0109e0fb908d09db12eaf8b9fd08525a25d5941a9ab9da0d730c51e4185a39c

MD5

ccfaf8678bfe1ecd0a4dc16d225195f4

Filesize

407KB

Score
7/10
SHA1

90f58e42214bafea1e0825d181b915ec3c7304c3

SHA256

e0109e0fb908d09db12eaf8b9fd08525a25d5941a9ab9da0d730c51e4185a39c

SHA512

991277fffa77b3488e06255e5c0b9572cbd18b3f7320cc2efc96d43736883cc9c84ce403dc204316dc93be3088ed9d7f057b798835f364313a5f55b3e113f9e1

Tags

Signatures

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Accesses cryptocurrency files/wallets, possible credential harvesting

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Discovery
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks

                    static1

                    behavioral1

                    7/10