General

  • Target

    cb1d854e84dadc82088b2c7beb542e02b68ebfe236fd36481fb7bc1d2156d96a

  • Size

    2.8MB

  • Sample

    221123-qcewjsgf5s

  • MD5

    db46e582064f971695def55152f82206

  • SHA1

    cec8c4b2f685f75e1b4de0af785911c36875517a

  • SHA256

    cb1d854e84dadc82088b2c7beb542e02b68ebfe236fd36481fb7bc1d2156d96a

  • SHA512

    39ce713b1488abafa9eee62f88846fb00f6673c6cfccd403ae824a5b069d6507b612fbe3438e17d7198b9f9d3583d491dbb0598c50ef86d956e0e4a185693006

  • SSDEEP

    49152:O9rT/PCAOgOr4K3o9hRTt/wc9rI4GrOh4oPMLchvlHqJ/cSbiRMav40BN7pp6c1O:iT/XOgsdMsc9rIDih4oUGvh7S+iO4c6H

Malware Config

Targets

    • Target

      cb1d854e84dadc82088b2c7beb542e02b68ebfe236fd36481fb7bc1d2156d96a

    • Size

      2.8MB

    • MD5

      db46e582064f971695def55152f82206

    • SHA1

      cec8c4b2f685f75e1b4de0af785911c36875517a

    • SHA256

      cb1d854e84dadc82088b2c7beb542e02b68ebfe236fd36481fb7bc1d2156d96a

    • SHA512

      39ce713b1488abafa9eee62f88846fb00f6673c6cfccd403ae824a5b069d6507b612fbe3438e17d7198b9f9d3583d491dbb0598c50ef86d956e0e4a185693006

    • SSDEEP

      49152:O9rT/PCAOgOr4K3o9hRTt/wc9rI4GrOh4oPMLchvlHqJ/cSbiRMav40BN7pp6c1O:iT/XOgsdMsc9rIDih4oUGvh7S+iO4c6H

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks