General

  • Target

    96cde34bed4f973ae12c77e954d8fd67043930851ffe32628f4c09713521bb83

  • Size

    5.7MB

  • Sample

    221123-njtxyaha58

  • MD5

    08f5e58ba6c11fc793f83331229d2cae

  • SHA1

    6529f96405061aee8cf40230ee83af5feb49f7f4

  • SHA256

    96cde34bed4f973ae12c77e954d8fd67043930851ffe32628f4c09713521bb83

  • SHA512

    39fd0797781471e44e0775575d310e540d492460fb15ba6e3a91af3fa478c60fb03835645998c1899de5f568e38e6089a3bd2aff48513348e93eb6270d573a0e

  • SSDEEP

    98304:mL+p957/mfkAb0JOyEmi+thHGAa0P9CQOGCfRJ2jlTDZ2l4wdcACdcruV95cze:689J/ANzywiJlgQNUJ2BTDYiqcAViVw6

Malware Config

Targets

    • Target

      96cde34bed4f973ae12c77e954d8fd67043930851ffe32628f4c09713521bb83

    • Size

      5.7MB

    • MD5

      08f5e58ba6c11fc793f83331229d2cae

    • SHA1

      6529f96405061aee8cf40230ee83af5feb49f7f4

    • SHA256

      96cde34bed4f973ae12c77e954d8fd67043930851ffe32628f4c09713521bb83

    • SHA512

      39fd0797781471e44e0775575d310e540d492460fb15ba6e3a91af3fa478c60fb03835645998c1899de5f568e38e6089a3bd2aff48513348e93eb6270d573a0e

    • SSDEEP

      98304:mL+p957/mfkAb0JOyEmi+thHGAa0P9CQOGCfRJ2jlTDZ2l4wdcACdcruV95cze:689J/ANzywiJlgQNUJ2BTDYiqcAViVw6

    • Executes dropped EXE

    • Modifies AppInit DLL entries

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks