General

  • Target

    14957f48f88223038ffe8a431776f42cf5cc80cd606f329055b54974a27b5d37

  • Size

    4.8MB

  • Sample

    220602-x1m1dsefgk

  • MD5

    4381866a52c954b95d195d4840db8aba

  • SHA1

    9a2522fd00883dd3d63d2ec0538eae55fe49ff9b

  • SHA256

    14957f48f88223038ffe8a431776f42cf5cc80cd606f329055b54974a27b5d37

  • SHA512

    e50d7a5251922b71e3ed902f79d1572686cc019a7946fd2301df3cb4df4daf3dcab5857412ae3d4628480e33e04584702d1e056492682382312d011cce1a9bc0

Malware Config

Targets

    • Target

      14957f48f88223038ffe8a431776f42cf5cc80cd606f329055b54974a27b5d37

    • Size

      4.8MB

    • MD5

      4381866a52c954b95d195d4840db8aba

    • SHA1

      9a2522fd00883dd3d63d2ec0538eae55fe49ff9b

    • SHA256

      14957f48f88223038ffe8a431776f42cf5cc80cd606f329055b54974a27b5d37

    • SHA512

      e50d7a5251922b71e3ed902f79d1572686cc019a7946fd2301df3cb4df4daf3dcab5857412ae3d4628480e33e04584702d1e056492682382312d011cce1a9bc0

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks