General

  • Target

    907b6500dba0a048d51a3381fafed7e8b6eb256381f53c6471ebb6d305fddfd4

  • Size

    413KB

  • Sample

    220623-sx818sgeb2

  • MD5

    acc0fb4cb35df2d49fc609f2e299ed5e

  • SHA1

    fff261da7332d1bef4253539c3217dcedce99a17

  • SHA256

    907b6500dba0a048d51a3381fafed7e8b6eb256381f53c6471ebb6d305fddfd4

  • SHA512

    117ac79355ca79948a050534b625d5bb757640429848a50ddf75fdff3095d03c5db66f74ec01bdc3c8296772b463cdf67963689aca323bedcc059c81ebf70d75

Malware Config

Targets

    • Target

      907b6500dba0a048d51a3381fafed7e8b6eb256381f53c6471ebb6d305fddfd4

    • Size

      413KB

    • MD5

      acc0fb4cb35df2d49fc609f2e299ed5e

    • SHA1

      fff261da7332d1bef4253539c3217dcedce99a17

    • SHA256

      907b6500dba0a048d51a3381fafed7e8b6eb256381f53c6471ebb6d305fddfd4

    • SHA512

      117ac79355ca79948a050534b625d5bb757640429848a50ddf75fdff3095d03c5db66f74ec01bdc3c8296772b463cdf67963689aca323bedcc059c81ebf70d75

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks