General

  • Target

    dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4

  • Size

    39KB

  • Sample

    221123-s6qk9adb78

  • MD5

    96f120ca40e931cbc8906c4122ed3d71

  • SHA1

    ab67f4ee5c0d29b033d586a9fc47ac12af6be0ca

  • SHA256

    dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4

  • SHA512

    2db6594325e34ecdd4b67cb0668ffd896112883e319466a8e08f996868b6a4d699107d6f2d47eb22c8e351be3172d1a7aeab1ff1dbdc42b32e8c3900db1f0474

  • SSDEEP

    768:Wrid+Ro3m7xzydFsDZbcQYwhxzzXdFVplNa7ku5t:9x2NzyzsDZbcQYwhxzrtI7NP

Malware Config

Targets

    • Target

      dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4

    • Size

      39KB

    • MD5

      96f120ca40e931cbc8906c4122ed3d71

    • SHA1

      ab67f4ee5c0d29b033d586a9fc47ac12af6be0ca

    • SHA256

      dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4

    • SHA512

      2db6594325e34ecdd4b67cb0668ffd896112883e319466a8e08f996868b6a4d699107d6f2d47eb22c8e351be3172d1a7aeab1ff1dbdc42b32e8c3900db1f0474

    • SSDEEP

      768:Wrid+Ro3m7xzydFsDZbcQYwhxzzXdFVplNa7ku5t:9x2NzyzsDZbcQYwhxzrtI7NP

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks