General

  • Target

    144f8c182177eead9b05dac7efdeda5fb423b1bb0e7ec211bb8623d072929c05

  • Size

    321KB

  • Sample

    220603-brastahbbk

  • MD5

    eb633b7b53815cbe4c12d061063e76ce

  • SHA1

    d13b6282807fa2518c483029b9b981a51627e3cc

  • SHA256

    144f8c182177eead9b05dac7efdeda5fb423b1bb0e7ec211bb8623d072929c05

  • SHA512

    64cec8e01d66752947a5ecdcde8091a9401d280c0a30a1cb18ef8608cd19a6db67d3fca793e568a68f23bbc5485a6aafa8028608f7e509d51857055d50aacfdf

Malware Config

Targets

    • Target

      144f8c182177eead9b05dac7efdeda5fb423b1bb0e7ec211bb8623d072929c05

    • Size

      321KB

    • MD5

      eb633b7b53815cbe4c12d061063e76ce

    • SHA1

      d13b6282807fa2518c483029b9b981a51627e3cc

    • SHA256

      144f8c182177eead9b05dac7efdeda5fb423b1bb0e7ec211bb8623d072929c05

    • SHA512

      64cec8e01d66752947a5ecdcde8091a9401d280c0a30a1cb18ef8608cd19a6db67d3fca793e568a68f23bbc5485a6aafa8028608f7e509d51857055d50aacfdf

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks