General

  • Target

    35c421c06c8c02839bcde4df85d29760808b7d0a550bcb64fb4f8a724cbee148

  • Size

    448KB

  • Sample

    221123-m8apxsga98

  • MD5

    4b474710105ef3fb6be98cb295f279a2

  • SHA1

    027feed77bdc42f65a22d6440ff02033cebc7c7a

  • SHA256

    35c421c06c8c02839bcde4df85d29760808b7d0a550bcb64fb4f8a724cbee148

  • SHA512

    bd703b21f9fa97444d19798ce727d262185735478a10a4072e5673c9d6cb54f137eb7f1dea2766489a095c85156820e98f7b05e79961dd0b12ec58ec384ec99a

  • SSDEEP

    12288:YXe9PPlowWX0t6mOQwg1Qd15CcYk0We1GUuaOCOz:VhloDX0XOf4oUuPCOz

Malware Config

Targets

    • Target

      35c421c06c8c02839bcde4df85d29760808b7d0a550bcb64fb4f8a724cbee148

    • Size

      448KB

    • MD5

      4b474710105ef3fb6be98cb295f279a2

    • SHA1

      027feed77bdc42f65a22d6440ff02033cebc7c7a

    • SHA256

      35c421c06c8c02839bcde4df85d29760808b7d0a550bcb64fb4f8a724cbee148

    • SHA512

      bd703b21f9fa97444d19798ce727d262185735478a10a4072e5673c9d6cb54f137eb7f1dea2766489a095c85156820e98f7b05e79961dd0b12ec58ec384ec99a

    • SSDEEP

      12288:YXe9PPlowWX0t6mOQwg1Qd15CcYk0We1GUuaOCOz:VhloDX0XOf4oUuPCOz

    • UAC bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks