General

  • Target

    6997d51b55fb926340e096a8ec3e6136c2bfe6a99b8ec4c8a8089ebc86f188ec

  • Size

    727KB

  • Sample

    221107-s5w2msech4

  • MD5

    079455c0faa7b616ccf8b0bb26947e50

  • SHA1

    34f4b1a0653d26fb8db3e7e7ecdc426af20f2d59

  • SHA256

    6997d51b55fb926340e096a8ec3e6136c2bfe6a99b8ec4c8a8089ebc86f188ec

  • SHA512

    8c87425e29f9683457ac6208511b572529065179806340b10b314c14b19a3c7d405b25acb4cdc9134a55d7b27839a5e628cd3ebc06955e8139870783502ed4a6

  • SSDEEP

    12288:P/d4pan0Yv/byYLy+vuZQcnB41NWm4NiEvCDdzWT/dG2:68nPDycyEub4HWxvEdKT82

Malware Config

Targets

    • Target

      6997d51b55fb926340e096a8ec3e6136c2bfe6a99b8ec4c8a8089ebc86f188ec

    • Size

      727KB

    • MD5

      079455c0faa7b616ccf8b0bb26947e50

    • SHA1

      34f4b1a0653d26fb8db3e7e7ecdc426af20f2d59

    • SHA256

      6997d51b55fb926340e096a8ec3e6136c2bfe6a99b8ec4c8a8089ebc86f188ec

    • SHA512

      8c87425e29f9683457ac6208511b572529065179806340b10b314c14b19a3c7d405b25acb4cdc9134a55d7b27839a5e628cd3ebc06955e8139870783502ed4a6

    • SSDEEP

      12288:P/d4pan0Yv/byYLy+vuZQcnB41NWm4NiEvCDdzWT/dG2:68nPDycyEub4HWxvEdKT82

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks