General

  • Target

    56a8832a8fe73bc31a8d7f1d6c5e101db792ea7efd220f74e1b1263359057b09

  • Size

    1.0MB

  • Sample

    220725-ch8h6aadgp

  • MD5

    7693700a5eb55f2442a6ec0400872661

  • SHA1

    51db686d92d80d48ee48905f5d0e853d4513ca5a

  • SHA256

    56a8832a8fe73bc31a8d7f1d6c5e101db792ea7efd220f74e1b1263359057b09

  • SHA512

    ba5621a0cf0b07a3a5f669046531f598cc4f9497ba888e1eb59ac08b47fe7df3d34067c70e3daca458df339411bab21a518d487010bf4a94b4b2598af5a7a2b8

Malware Config

Targets

    • Target

      56a8832a8fe73bc31a8d7f1d6c5e101db792ea7efd220f74e1b1263359057b09

    • Size

      1.0MB

    • MD5

      7693700a5eb55f2442a6ec0400872661

    • SHA1

      51db686d92d80d48ee48905f5d0e853d4513ca5a

    • SHA256

      56a8832a8fe73bc31a8d7f1d6c5e101db792ea7efd220f74e1b1263359057b09

    • SHA512

      ba5621a0cf0b07a3a5f669046531f598cc4f9497ba888e1eb59ac08b47fe7df3d34067c70e3daca458df339411bab21a518d487010bf4a94b4b2598af5a7a2b8

    • suricata: ET MALWARE Win32/Kelihos.F Checkin

      suricata: ET MALWARE Win32/Kelihos.F Checkin

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks