General

  • Target

    ce85f2e2a612cd5b445927708dd51c9c144a622b2b623878e37816bedc5885d4

  • Size

    2.6MB

  • Sample

    220524-2amn6aeabk

  • MD5

    92d1028170e6dd9f30356eb5d9c12442

  • SHA1

    ae301b53bc8d778a87e30d0461b5e796af7674ed

  • SHA256

    ce85f2e2a612cd5b445927708dd51c9c144a622b2b623878e37816bedc5885d4

  • SHA512

    18b11cc7abcacd6fc98981a074c2fbd7177571e1824a86e32e270b2a65a56a52d105b78cd70935d2c336274a5967d9d6121d4e67413023efa0d10fc5f1209344

Malware Config

Targets

    • Target

      ce85f2e2a612cd5b445927708dd51c9c144a622b2b623878e37816bedc5885d4

    • Size

      2.6MB

    • MD5

      92d1028170e6dd9f30356eb5d9c12442

    • SHA1

      ae301b53bc8d778a87e30d0461b5e796af7674ed

    • SHA256

      ce85f2e2a612cd5b445927708dd51c9c144a622b2b623878e37816bedc5885d4

    • SHA512

      18b11cc7abcacd6fc98981a074c2fbd7177571e1824a86e32e270b2a65a56a52d105b78cd70935d2c336274a5967d9d6121d4e67413023efa0d10fc5f1209344

    • Nirsoft

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks