General

  • Target

    b0edbcfe6c92deee182b0a1d0822e7180886038c4d63c37dba70fabe7499250b

  • Size

    416KB

  • Sample

    220521-w56gvsbab4

  • MD5

    39febeaa1a4836c29b1c240d4c6be5e2

  • SHA1

    cbc3fc48f58fb13d143fc7c3531c1afb92c08869

  • SHA256

    b0edbcfe6c92deee182b0a1d0822e7180886038c4d63c37dba70fabe7499250b

  • SHA512

    3e0ac0c4f8dc137df3b9318ef939efa6e20985c3aa025dfa34c62981225e633ecb2b94f792116053bf0b26a65e8f9955582e5d32de7ef238d24db9f21961c37a

Malware Config

Targets

    • Target

      b0edbcfe6c92deee182b0a1d0822e7180886038c4d63c37dba70fabe7499250b

    • Size

      416KB

    • MD5

      39febeaa1a4836c29b1c240d4c6be5e2

    • SHA1

      cbc3fc48f58fb13d143fc7c3531c1afb92c08869

    • SHA256

      b0edbcfe6c92deee182b0a1d0822e7180886038c4d63c37dba70fabe7499250b

    • SHA512

      3e0ac0c4f8dc137df3b9318ef939efa6e20985c3aa025dfa34c62981225e633ecb2b94f792116053bf0b26a65e8f9955582e5d32de7ef238d24db9f21961c37a

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks