General

  • Target

    128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f

  • Size

    459KB

  • Sample

    220603-slznesafh9

  • MD5

    b2ef28ee87bc3d936e128faa4fd89bb8

  • SHA1

    0f27b77ac9caac0dbfbb88acd02025766c72c64e

  • SHA256

    128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f

  • SHA512

    5604591119b1a07d1bcfa2c2f365e3fa35c02871f1ebaa8c71b9a5b4ec75d9d73fc2b1073c3ecf282b575bbf8e9cd1d6a7ff050cdcceba5394a2cdfbad386bd2

Malware Config

Targets

    • Target

      128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f

    • Size

      459KB

    • MD5

      b2ef28ee87bc3d936e128faa4fd89bb8

    • SHA1

      0f27b77ac9caac0dbfbb88acd02025766c72c64e

    • SHA256

      128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f

    • SHA512

      5604591119b1a07d1bcfa2c2f365e3fa35c02871f1ebaa8c71b9a5b4ec75d9d73fc2b1073c3ecf282b575bbf8e9cd1d6a7ff050cdcceba5394a2cdfbad386bd2

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Connection Proxy

1
T1090

Tasks