General

  • Target

    9b0856fd5d455947011fe33027cc1a35b5c215a45ac2c128ed04de77ce3dedf8

  • Size

    194KB

  • Sample

    221103-nqcx1ahga6

  • MD5

    002d053b5f2c779056803825691bd13a

  • SHA1

    b981656bfc4637a8b3249b20293c85ff1ca11603

  • SHA256

    9b0856fd5d455947011fe33027cc1a35b5c215a45ac2c128ed04de77ce3dedf8

  • SHA512

    2124bea4875c0a6e4981402d829e2cb071aca6ab5051260594c916dfcaf315cd50efb9938012f0109d1ce91b2a420fe768fc26e286db58559e9916fcb8e81666

  • SSDEEP

    3072:B/ruoZtbRPuLNMXgSrayXVE9y4qQDHg2EPkoTrEsjHZvQ3hl43vpMvSGWqB2nUY:JZHuhDylEtDAvPJTrF5vQ37IMS

Malware Config

Targets

    • Target

      9b0856fd5d455947011fe33027cc1a35b5c215a45ac2c128ed04de77ce3dedf8

    • Size

      194KB

    • MD5

      002d053b5f2c779056803825691bd13a

    • SHA1

      b981656bfc4637a8b3249b20293c85ff1ca11603

    • SHA256

      9b0856fd5d455947011fe33027cc1a35b5c215a45ac2c128ed04de77ce3dedf8

    • SHA512

      2124bea4875c0a6e4981402d829e2cb071aca6ab5051260594c916dfcaf315cd50efb9938012f0109d1ce91b2a420fe768fc26e286db58559e9916fcb8e81666

    • SSDEEP

      3072:B/ruoZtbRPuLNMXgSrayXVE9y4qQDHg2EPkoTrEsjHZvQ3hl43vpMvSGWqB2nUY:JZHuhDylEtDAvPJTrF5vQ37IMS

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks