General

  • Target

    33f3ca8799dac862d1083f5a7376a0ead3d79fa5ff4a57154ef4ea2c05f6a93e

  • Size

    3.7MB

  • Sample

    221011-s4jd6acdbl

  • MD5

    66000c5f4ab1a3e0581b82c7ec037eda

  • SHA1

    266a7e51ac3ee8b5d73e19461a226a3dae5f5627

  • SHA256

    33f3ca8799dac862d1083f5a7376a0ead3d79fa5ff4a57154ef4ea2c05f6a93e

  • SHA512

    77ad229bc5db67a918db715a843ae5b14bb0547cf010cc7e56f70b89d5c3aac411590b9261440fd1db41a6f37788716fc0fe3a91c51e429a3b517b676e354ea8

  • SSDEEP

    49152:XGkO/hDNTa/UhqNl8vLvwUQfsypLSvcnkKs0ByZq8gbfwTCEf5AMQBvPngksT68k:XGk/UYNl8zvwUQfsypOvT0Y8RjYM8u9

Malware Config

Targets

    • Target

      33f3ca8799dac862d1083f5a7376a0ead3d79fa5ff4a57154ef4ea2c05f6a93e

    • Size

      3.7MB

    • MD5

      66000c5f4ab1a3e0581b82c7ec037eda

    • SHA1

      266a7e51ac3ee8b5d73e19461a226a3dae5f5627

    • SHA256

      33f3ca8799dac862d1083f5a7376a0ead3d79fa5ff4a57154ef4ea2c05f6a93e

    • SHA512

      77ad229bc5db67a918db715a843ae5b14bb0547cf010cc7e56f70b89d5c3aac411590b9261440fd1db41a6f37788716fc0fe3a91c51e429a3b517b676e354ea8

    • SSDEEP

      49152:XGkO/hDNTa/UhqNl8vLvwUQfsypLSvcnkKs0ByZq8gbfwTCEf5AMQBvPngksT68k:XGk/UYNl8zvwUQfsypOvT0Y8RjYM8u9

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks