General

  • Target

    ChromeSetup.exe

  • Size

    2.3MB

  • Sample

    221115-1v95hsca3v

  • MD5

    bef263acb771378244d3f987971c160a

  • SHA1

    fd7e414e8f2efb6711820508bcc4f2f09416e2c8

  • SHA256

    4fa6a99bca80113b7ab78d2856de0543e517b539c024f16dec31fb1ab3cb85cf

  • SHA512

    144eace37f55bcb63c771449cb8c9e47b84e1a475837265e98c92a7d46d63ff7f7c349ddba14e427f887ba00ba79b62828de75b885b5b365ec75f6eb69dbb220

  • SSDEEP

    49152:y31h6jJ4GCP+NV2iPcF3cPbFMT1vkWZVoimDaIEk2necB7QbbiES7n/:yPU7++NtPOca5vhkixDejU

Malware Config

Targets

    • Target

      ChromeSetup.exe

    • Size

      2.3MB

    • MD5

      bef263acb771378244d3f987971c160a

    • SHA1

      fd7e414e8f2efb6711820508bcc4f2f09416e2c8

    • SHA256

      4fa6a99bca80113b7ab78d2856de0543e517b539c024f16dec31fb1ab3cb85cf

    • SHA512

      144eace37f55bcb63c771449cb8c9e47b84e1a475837265e98c92a7d46d63ff7f7c349ddba14e427f887ba00ba79b62828de75b885b5b365ec75f6eb69dbb220

    • SSDEEP

      49152:y31h6jJ4GCP+NV2iPcF3cPbFMT1vkWZVoimDaIEk2necB7QbbiES7n/:yPU7++NtPOca5vhkixDejU

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks