General

  • Target

    179a8b79cfe8e5fc182b0f24a649c68ef287bdc086397da4c8dbac9209fa43e5

  • Size

    3.1MB

  • Sample

    220608-y7cnnsffhk

  • MD5

    777d5d8c884c31a983b92bc10b2f00e3

  • SHA1

    9425fdbb712385ce16de28cd1263f12994faff73

  • SHA256

    179a8b79cfe8e5fc182b0f24a649c68ef287bdc086397da4c8dbac9209fa43e5

  • SHA512

    1f9b9d7de8d8f4a08011c42b0c2cae255bfc7966b299a44320e2c10a8fcd4075c2424caadae6da6d38f1996f95e2dd7701131f43e929d3770b336fa9e25be38c

Malware Config

Targets

    • Target

      179a8b79cfe8e5fc182b0f24a649c68ef287bdc086397da4c8dbac9209fa43e5

    • Size

      3.1MB

    • MD5

      777d5d8c884c31a983b92bc10b2f00e3

    • SHA1

      9425fdbb712385ce16de28cd1263f12994faff73

    • SHA256

      179a8b79cfe8e5fc182b0f24a649c68ef287bdc086397da4c8dbac9209fa43e5

    • SHA512

      1f9b9d7de8d8f4a08011c42b0c2cae255bfc7966b299a44320e2c10a8fcd4075c2424caadae6da6d38f1996f95e2dd7701131f43e929d3770b336fa9e25be38c

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks