General

  • Target

    7773d8f158e36f66370ffdc27588f491c4abe2613baed9b3ea2b7efa86af8796

  • Size

    1.0MB

  • Sample

    221123-s3rn5sch83

  • MD5

    9edc1f92e5d318222169ed549257555d

  • SHA1

    fc5b03dd4064ade080ddec0368d912516adb3a60

  • SHA256

    7773d8f158e36f66370ffdc27588f491c4abe2613baed9b3ea2b7efa86af8796

  • SHA512

    fe0f0007b1548a0f4b2288f7e0d3e15e9aef2b30a61bf06205829ff46aa1ba3247f9974fc3fecee4ddacd35cc8a7111bac3634a6031b308927ca1dd049906fa9

  • SSDEEP

    12288:7w9ezFXTSvmbZkCkWrs5/mzfi2AJ03eAmJwjUz70NqqqFZ6US62QCo4609UyPcBY:Tt1VfkMs5Mi2oFAmJzdbEUyIiFQwzes

Malware Config

Targets

    • Target

      7773d8f158e36f66370ffdc27588f491c4abe2613baed9b3ea2b7efa86af8796

    • Size

      1.0MB

    • MD5

      9edc1f92e5d318222169ed549257555d

    • SHA1

      fc5b03dd4064ade080ddec0368d912516adb3a60

    • SHA256

      7773d8f158e36f66370ffdc27588f491c4abe2613baed9b3ea2b7efa86af8796

    • SHA512

      fe0f0007b1548a0f4b2288f7e0d3e15e9aef2b30a61bf06205829ff46aa1ba3247f9974fc3fecee4ddacd35cc8a7111bac3634a6031b308927ca1dd049906fa9

    • SSDEEP

      12288:7w9ezFXTSvmbZkCkWrs5/mzfi2AJ03eAmJwjUz70NqqqFZ6US62QCo4609UyPcBY:Tt1VfkMs5Mi2oFAmJzdbEUyIiFQwzes

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks