General

  • Target

    37435a8ec0f7afabf767e08c57f5d0fcd7fbf1aa7cb6eab24c4178bdc40ffe01

  • Size

    501KB

  • Sample

    220625-3xknrahafk

  • MD5

    2af3125fe1dc2d872ae96fa898d31025

  • SHA1

    520276bd895559d8cac8ba9829d467521a7b764e

  • SHA256

    37435a8ec0f7afabf767e08c57f5d0fcd7fbf1aa7cb6eab24c4178bdc40ffe01

  • SHA512

    8a497dd8fe4859f2f5f749bebdbac392fd40c051075e710504c51687ef9e8e008fb3294b36d666d46d36c73caa93748b25151239c96e4452be02ef1c0d4eb0b3

Malware Config

Targets

    • Target

      37435a8ec0f7afabf767e08c57f5d0fcd7fbf1aa7cb6eab24c4178bdc40ffe01

    • Size

      501KB

    • MD5

      2af3125fe1dc2d872ae96fa898d31025

    • SHA1

      520276bd895559d8cac8ba9829d467521a7b764e

    • SHA256

      37435a8ec0f7afabf767e08c57f5d0fcd7fbf1aa7cb6eab24c4178bdc40ffe01

    • SHA512

      8a497dd8fe4859f2f5f749bebdbac392fd40c051075e710504c51687ef9e8e008fb3294b36d666d46d36c73caa93748b25151239c96e4452be02ef1c0d4eb0b3

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

4
T1005

Tasks