General

  • Target

    efd06d40225ea343c311a623570a2213ebeca87e745b43ee758964fff0037459

  • Size

    157KB

  • Sample

    220524-zwhk8abhfq

  • MD5

    9b1fb4bb567610877ff68a7ffa2482dc

  • SHA1

    c9d557af57a431e490788f33f63a6c68e2436267

  • SHA256

    efd06d40225ea343c311a623570a2213ebeca87e745b43ee758964fff0037459

  • SHA512

    8b828fd45eb09e959d2d23f4186d4031482d02a45702c3aad202f97415ae400147ab9c041d6fd3a3f9dbc7338906eba7c266dd4a422bcb9744918377ecd68aa4

Malware Config

Targets

    • Target

      efd06d40225ea343c311a623570a2213ebeca87e745b43ee758964fff0037459

    • Size

      157KB

    • MD5

      9b1fb4bb567610877ff68a7ffa2482dc

    • SHA1

      c9d557af57a431e490788f33f63a6c68e2436267

    • SHA256

      efd06d40225ea343c311a623570a2213ebeca87e745b43ee758964fff0037459

    • SHA512

      8b828fd45eb09e959d2d23f4186d4031482d02a45702c3aad202f97415ae400147ab9c041d6fd3a3f9dbc7338906eba7c266dd4a422bcb9744918377ecd68aa4

    • sakari

      Sakari is a stealer written in C#.

    • suricata: ET MALWARE Sorano Stealer CnC Checkin

      suricata: ET MALWARE Sorano Stealer CnC Checkin

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks