General

  • Target

    62bbc12e2dd76776706764704feaf1d94c5c52b7dfa7d1d56a58dec9d4722c6c

  • Size

    43KB

  • Sample

    221106-kmqg5scce7

  • MD5

    0a8f9de9764eb6a4e76ca9a8f944b2c8

  • SHA1

    012f0bba1bb017692a56349683184f8eb0764c11

  • SHA256

    62bbc12e2dd76776706764704feaf1d94c5c52b7dfa7d1d56a58dec9d4722c6c

  • SHA512

    a9724fcfb948d55a759b303dc8be930d5e9fac62f024f9607af4b20d9972eb61b4f0e0c25628ab9aa07b28d4f9bcb87a78b5218a7730f282a2cabf944f5648f9

  • SSDEEP

    768:5raTJXgTU4wpIdvQ96VVacE1cZ0/Gq88AvoQhAvMSOm3ETAv5SoVb:taTJQT9QIdm2/ESZ0/d881wPSOmUTASG

Malware Config

Targets

    • Target

      62bbc12e2dd76776706764704feaf1d94c5c52b7dfa7d1d56a58dec9d4722c6c

    • Size

      43KB

    • MD5

      0a8f9de9764eb6a4e76ca9a8f944b2c8

    • SHA1

      012f0bba1bb017692a56349683184f8eb0764c11

    • SHA256

      62bbc12e2dd76776706764704feaf1d94c5c52b7dfa7d1d56a58dec9d4722c6c

    • SHA512

      a9724fcfb948d55a759b303dc8be930d5e9fac62f024f9607af4b20d9972eb61b4f0e0c25628ab9aa07b28d4f9bcb87a78b5218a7730f282a2cabf944f5648f9

    • SSDEEP

      768:5raTJXgTU4wpIdvQ96VVacE1cZ0/Gq88AvoQhAvMSOm3ETAv5SoVb:taTJQT9QIdm2/ESZ0/d881wPSOmUTASG

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks