General

  • Target

    56601d91a44c55a697ac0eb0a417d4df7e7fa6761ca423f68c4fc4b80ebddbe4

  • Size

    1.0MB

  • Sample

    220725-ebadwsdedr

  • MD5

    852358b498a9fec383553c1960a36473

  • SHA1

    bce959aadba354238203e88e38562ba1797a0bd8

  • SHA256

    56601d91a44c55a697ac0eb0a417d4df7e7fa6761ca423f68c4fc4b80ebddbe4

  • SHA512

    5f2bf3af9a17a2fbf1cd5083bf6e60134a94fcb92838f794eabe5713a7dbe57347c3374a66875dce55052a2da33e5be202e186f7398b4dc3e574af17a3cb25f2

Malware Config

Targets

    • Target

      56601d91a44c55a697ac0eb0a417d4df7e7fa6761ca423f68c4fc4b80ebddbe4

    • Size

      1.0MB

    • MD5

      852358b498a9fec383553c1960a36473

    • SHA1

      bce959aadba354238203e88e38562ba1797a0bd8

    • SHA256

      56601d91a44c55a697ac0eb0a417d4df7e7fa6761ca423f68c4fc4b80ebddbe4

    • SHA512

      5f2bf3af9a17a2fbf1cd5083bf6e60134a94fcb92838f794eabe5713a7dbe57347c3374a66875dce55052a2da33e5be202e186f7398b4dc3e574af17a3cb25f2

    • suricata: ET MALWARE Win32/Kelihos.F Checkin

      suricata: ET MALWARE Win32/Kelihos.F Checkin

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks