General

  • Target

    56735166d8ba22753eb9f6b11935613deeec9f76cd60150712d83a0dc11fa192

  • Size

    1.0MB

  • Sample

    220725-dshk6acfdl

  • MD5

    587407fe5a8d4a3c7c499a10bff9e36a

  • SHA1

    af7e22ae5c956d8f7e39cbb3e3623b4ea9d4f94d

  • SHA256

    56735166d8ba22753eb9f6b11935613deeec9f76cd60150712d83a0dc11fa192

  • SHA512

    848a997e1dd9041d1e07a749e953901caa90449fe58ea26277db29337dd610c18b8cffaff47e71e98978a40f9fb64dc35ea3c0aa03d9ce09a960c5f059eaa070

Malware Config

Targets

    • Target

      56735166d8ba22753eb9f6b11935613deeec9f76cd60150712d83a0dc11fa192

    • Size

      1.0MB

    • MD5

      587407fe5a8d4a3c7c499a10bff9e36a

    • SHA1

      af7e22ae5c956d8f7e39cbb3e3623b4ea9d4f94d

    • SHA256

      56735166d8ba22753eb9f6b11935613deeec9f76cd60150712d83a0dc11fa192

    • SHA512

      848a997e1dd9041d1e07a749e953901caa90449fe58ea26277db29337dd610c18b8cffaff47e71e98978a40f9fb64dc35ea3c0aa03d9ce09a960c5f059eaa070

    • suricata: ET MALWARE Win32/Kelihos.F Checkin

      suricata: ET MALWARE Win32/Kelihos.F Checkin

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks