General

  • Target

    5f9484bd0136da270398279a49369490fbb2ba4fa92e73126b60b75148da407f

  • Size

    677KB

  • Sample

    220731-m1k6padhcm

  • MD5

    fd4bcc51f6325388f8d2e6c3f6b32cee

  • SHA1

    99f99a4b5655d01789e9ebe97effc7b64369c641

  • SHA256

    5f9484bd0136da270398279a49369490fbb2ba4fa92e73126b60b75148da407f

  • SHA512

    c7a8577cc54c05227768f079648414819673cbefb7d2824724683a702febb476ac38270f4ac4c98d5639fa789697e9738ef6e98487774b594d114bdecb3309e3

Malware Config

Extracted

Family

coldstealer

Botnet

l12

C2

http://topexpertshop.com/

Targets

    • Target

      5f9484bd0136da270398279a49369490fbb2ba4fa92e73126b60b75148da407f

    • Size

      677KB

    • MD5

      fd4bcc51f6325388f8d2e6c3f6b32cee

    • SHA1

      99f99a4b5655d01789e9ebe97effc7b64369c641

    • SHA256

      5f9484bd0136da270398279a49369490fbb2ba4fa92e73126b60b75148da407f

    • SHA512

      c7a8577cc54c05227768f079648414819673cbefb7d2824724683a702febb476ac38270f4ac4c98d5639fa789697e9738ef6e98487774b594d114bdecb3309e3

    • Cold Stealer

      An info stealer written in C#, first seen in Feb 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks