General

  • Target

    2a4f994547c0cff4fa435dac811ce92c2465305e06487fce64e1f396fbef48ef

  • Size

    6.2MB

  • Sample

    220919-16dwfsbeh2

  • MD5

    cf0c5cf9569f64fd46d3303ab892e467

  • SHA1

    d5bf04b97ed664f1b72261affdf230bfcd3cbe9c

  • SHA256

    2a4f994547c0cff4fa435dac811ce92c2465305e06487fce64e1f396fbef48ef

  • SHA512

    20878d508aa3f0be002bf5d086c13bd05c4407dfa643f15058e719ceeac9229af9369cc86e8c596ea6a338b48a672ef909bde20afc67be1d45afe098dc45c8ca

  • SSDEEP

    49152:xu9DG/n7dDOkWRaxQSPs+bZMmWIm5CyIsapfNdcNH1t8jTMJSdWM07v+BMWf1xZc:OG/7hNzxhL+mWW3je+WJjWfLZnl3d5

Malware Config

Targets

    • Target

      2a4f994547c0cff4fa435dac811ce92c2465305e06487fce64e1f396fbef48ef

    • Size

      6.2MB

    • MD5

      cf0c5cf9569f64fd46d3303ab892e467

    • SHA1

      d5bf04b97ed664f1b72261affdf230bfcd3cbe9c

    • SHA256

      2a4f994547c0cff4fa435dac811ce92c2465305e06487fce64e1f396fbef48ef

    • SHA512

      20878d508aa3f0be002bf5d086c13bd05c4407dfa643f15058e719ceeac9229af9369cc86e8c596ea6a338b48a672ef909bde20afc67be1d45afe098dc45c8ca

    • SSDEEP

      49152:xu9DG/n7dDOkWRaxQSPs+bZMmWIm5CyIsapfNdcNH1t8jTMJSdWM07v+BMWf1xZc:OG/7hNzxhL+mWW3je+WJjWfLZnl3d5

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks