General

  • Target

    466a2ddc6b550ff8ca2e097675a932022310b14fb1689552a75749d3cb6a144c

  • Size

    415KB

  • Sample

    220521-yp89xsgddj

  • MD5

    c532672eb943d5eccd9807aee6b332ce

  • SHA1

    09bc6ce41eb252b14e1f8cb8dfb8eb8840cbf129

  • SHA256

    466a2ddc6b550ff8ca2e097675a932022310b14fb1689552a75749d3cb6a144c

  • SHA512

    95d12779992cf7bba1e49ac2e026650c9ac6faf636edb57ab9ae1c2bd15b4e5da5e933b088e6075a9e2a7a2b1717e2ab03b83b5cade3e341a5a5e0bd45ee21c0

Malware Config

Targets

    • Target

      466a2ddc6b550ff8ca2e097675a932022310b14fb1689552a75749d3cb6a144c

    • Size

      415KB

    • MD5

      c532672eb943d5eccd9807aee6b332ce

    • SHA1

      09bc6ce41eb252b14e1f8cb8dfb8eb8840cbf129

    • SHA256

      466a2ddc6b550ff8ca2e097675a932022310b14fb1689552a75749d3cb6a144c

    • SHA512

      95d12779992cf7bba1e49ac2e026650c9ac6faf636edb57ab9ae1c2bd15b4e5da5e933b088e6075a9e2a7a2b1717e2ab03b83b5cade3e341a5a5e0bd45ee21c0

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks