General

  • Target

    226199392e0c5c46215bce3ec183da6e1265ccb9c971400c7082cf6de963cbf6

  • Size

    3.5MB

  • Sample

    221020-p5geeaecar

  • MD5

    819218bbd0cea207c1d8f2fa608d58f2

  • SHA1

    2f0142bed0bc1aa05a30856bb0dbc8d382ad386b

  • SHA256

    226199392e0c5c46215bce3ec183da6e1265ccb9c971400c7082cf6de963cbf6

  • SHA512

    b351d49adbf9df3719ae5f5e463871453a0017e743acc61dd6fcc9886f9b6fb9aebe7fb50a9bbd45e49c30a59d036d7b321cccaab37b94a8ded31592699a1efa

  • SSDEEP

    24576:W8/uomE9Q8mT3i5OJ11D7840V8dq8ZDuQItBV9kTbcDeuAe2te67lRzCK1ObQ4oP:Z+ig1A40eIHV8bcDs/hROBf7l1r2

Malware Config

Targets

    • Target

      226199392e0c5c46215bce3ec183da6e1265ccb9c971400c7082cf6de963cbf6

    • Size

      3.5MB

    • MD5

      819218bbd0cea207c1d8f2fa608d58f2

    • SHA1

      2f0142bed0bc1aa05a30856bb0dbc8d382ad386b

    • SHA256

      226199392e0c5c46215bce3ec183da6e1265ccb9c971400c7082cf6de963cbf6

    • SHA512

      b351d49adbf9df3719ae5f5e463871453a0017e743acc61dd6fcc9886f9b6fb9aebe7fb50a9bbd45e49c30a59d036d7b321cccaab37b94a8ded31592699a1efa

    • SSDEEP

      24576:W8/uomE9Q8mT3i5OJ11D7840V8dq8ZDuQItBV9kTbcDeuAe2te67lRzCK1ObQ4oP:Z+ig1A40eIHV8bcDs/hROBf7l1r2

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks