General

  • Target

    55f6a19b7ac142e24f96cf78b53191d41880dc1a8279976d023ecfe49da633a1

  • Size

    1.0MB

  • Sample

    220725-g2tlkaaddp

  • MD5

    53ee564dae311a0c89c7b604ff52219e

  • SHA1

    5dbb2986c44a555ad6c63c9a0c3ba49e53a652bf

  • SHA256

    55f6a19b7ac142e24f96cf78b53191d41880dc1a8279976d023ecfe49da633a1

  • SHA512

    974a810d85b1c3d0309b48b19c9671411428f3430105515b70881f581b1ef75afbad81418edf08aec3a24a587d5504d5f5abff224039ad5b0b1a2ffe4cb1b268

Malware Config

Targets

    • Target

      55f6a19b7ac142e24f96cf78b53191d41880dc1a8279976d023ecfe49da633a1

    • Size

      1.0MB

    • MD5

      53ee564dae311a0c89c7b604ff52219e

    • SHA1

      5dbb2986c44a555ad6c63c9a0c3ba49e53a652bf

    • SHA256

      55f6a19b7ac142e24f96cf78b53191d41880dc1a8279976d023ecfe49da633a1

    • SHA512

      974a810d85b1c3d0309b48b19c9671411428f3430105515b70881f581b1ef75afbad81418edf08aec3a24a587d5504d5f5abff224039ad5b0b1a2ffe4cb1b268

    • suricata: ET MALWARE Win32/Kelihos.F Checkin

      suricata: ET MALWARE Win32/Kelihos.F Checkin

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks