General

  • Target

    569aaa607c44a12807f62e29b0d033c8a39808efa752325b4ec6c57ac225f055

  • Size

    1.0MB

  • Sample

    220725-ctg6caahhn

  • MD5

    0451f92af3797d358e2f407a6388b750

  • SHA1

    c0a996f47ad207fbda498d2907699a54c36b91ad

  • SHA256

    569aaa607c44a12807f62e29b0d033c8a39808efa752325b4ec6c57ac225f055

  • SHA512

    9924ff006456f7940e233124db646aac2df622431442ec591ee15a32dfdd77e568351d722529da0e795d0b8e4a2f23267a3de3cdd75575ac4d1aacf35b9c6818

Malware Config

Targets

    • Target

      569aaa607c44a12807f62e29b0d033c8a39808efa752325b4ec6c57ac225f055

    • Size

      1.0MB

    • MD5

      0451f92af3797d358e2f407a6388b750

    • SHA1

      c0a996f47ad207fbda498d2907699a54c36b91ad

    • SHA256

      569aaa607c44a12807f62e29b0d033c8a39808efa752325b4ec6c57ac225f055

    • SHA512

      9924ff006456f7940e233124db646aac2df622431442ec591ee15a32dfdd77e568351d722529da0e795d0b8e4a2f23267a3de3cdd75575ac4d1aacf35b9c6818

    • suricata: ET MALWARE Win32/Kelihos.F Checkin

      suricata: ET MALWARE Win32/Kelihos.F Checkin

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks