General

  • Target

    014f4e5209c377ede3c4ba4c118c16fd6b6b7143f541e2ab18326a72b773b0cb

  • Size

    632KB

  • Sample

    220523-y8w4psfcc2

  • MD5

    8fa9f79274a9a99652db5cb7d914b59c

  • SHA1

    2a00ee64ed7af5a4efb02cecec43c13de438e45b

  • SHA256

    014f4e5209c377ede3c4ba4c118c16fd6b6b7143f541e2ab18326a72b773b0cb

  • SHA512

    03a58704ec2fc29c7d50d7adfcd085199910266662c4e92580358a94ef4b1794caf08708f1f1707725e53ea750d5bfe069c79431286f7b29473f5b1e7c31d30a

Malware Config

Targets

    • Target

      014f4e5209c377ede3c4ba4c118c16fd6b6b7143f541e2ab18326a72b773b0cb

    • Size

      632KB

    • MD5

      8fa9f79274a9a99652db5cb7d914b59c

    • SHA1

      2a00ee64ed7af5a4efb02cecec43c13de438e45b

    • SHA256

      014f4e5209c377ede3c4ba4c118c16fd6b6b7143f541e2ab18326a72b773b0cb

    • SHA512

      03a58704ec2fc29c7d50d7adfcd085199910266662c4e92580358a94ef4b1794caf08708f1f1707725e53ea750d5bfe069c79431286f7b29473f5b1e7c31d30a

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks