General

  • Target

    578331fe8fcacade71e6528882e380e8de0de55f1b9ab711d713283c5e6cf379

  • Size

    1.0MB

  • Sample

    220724-1vr9psabej

  • MD5

    053f2acc6c7f234d175937fa9487796d

  • SHA1

    71fd88bfc323fecceece2f64a2a62d6a7a2ffdfe

  • SHA256

    578331fe8fcacade71e6528882e380e8de0de55f1b9ab711d713283c5e6cf379

  • SHA512

    cfd66efcba24fdd8a4984c0898b61725704214bb64919d52a1d1b39c14daf535c6aad3576f831ef6b1f5b69e1dfdd74b3c2a27f7c12895e49bfa73a72a909a7d

Malware Config

Targets

    • Target

      578331fe8fcacade71e6528882e380e8de0de55f1b9ab711d713283c5e6cf379

    • Size

      1.0MB

    • MD5

      053f2acc6c7f234d175937fa9487796d

    • SHA1

      71fd88bfc323fecceece2f64a2a62d6a7a2ffdfe

    • SHA256

      578331fe8fcacade71e6528882e380e8de0de55f1b9ab711d713283c5e6cf379

    • SHA512

      cfd66efcba24fdd8a4984c0898b61725704214bb64919d52a1d1b39c14daf535c6aad3576f831ef6b1f5b69e1dfdd74b3c2a27f7c12895e49bfa73a72a909a7d

    • suricata: ET MALWARE Win32/Kelihos.F Checkin

      suricata: ET MALWARE Win32/Kelihos.F Checkin

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks