General

  • Target

    5715a93ba379aaeada90f6a7d3b4d39d676934c342bb0a74ba9b14c09b1bb8cc

  • Size

    1.0MB

  • Sample

    220725-a459tagadm

  • MD5

    312832da60e3ed7c5ff97210ab81f8ae

  • SHA1

    96e1e816186feb50f503d33488a8eeb5f7054bd4

  • SHA256

    5715a93ba379aaeada90f6a7d3b4d39d676934c342bb0a74ba9b14c09b1bb8cc

  • SHA512

    a9dcb0525971bec845e94e131ef3fd829ccbf6ab532626ed2a79a5e412875bd9b9f616a91e7b661627f33e8772749f7e233e0682dd78994cbf727b9b45bad8fd

Malware Config

Targets

    • Target

      5715a93ba379aaeada90f6a7d3b4d39d676934c342bb0a74ba9b14c09b1bb8cc

    • Size

      1.0MB

    • MD5

      312832da60e3ed7c5ff97210ab81f8ae

    • SHA1

      96e1e816186feb50f503d33488a8eeb5f7054bd4

    • SHA256

      5715a93ba379aaeada90f6a7d3b4d39d676934c342bb0a74ba9b14c09b1bb8cc

    • SHA512

      a9dcb0525971bec845e94e131ef3fd829ccbf6ab532626ed2a79a5e412875bd9b9f616a91e7b661627f33e8772749f7e233e0682dd78994cbf727b9b45bad8fd

    • suricata: ET MALWARE Win32/Kelihos.F Checkin

      suricata: ET MALWARE Win32/Kelihos.F Checkin

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks