General

  • Target

    9db37f214f177e141981dba83d4c27336176909e1396e7026d4a87656c324610

  • Size

    4.5MB

  • Sample

    221124-1gcxvsbb67

  • MD5

    cb1ec9ffe7b481b867a6a939494f1fa3

  • SHA1

    e62333030df25ddd7812552a0afd765bd4cfd7e3

  • SHA256

    9db37f214f177e141981dba83d4c27336176909e1396e7026d4a87656c324610

  • SHA512

    d346dcecf61ccfb5fcdfdc8f52dab31faf7b4bf33ab976dbb2af67c4ac4bcfb6aa4bab2edb87bb7b0a05beb2191a604d3a657ab9300f543b56a786cdb0401e9a

  • SSDEEP

    49152:woaKaJJEq9+zJUHaxup4v12M6MUmgLptOyCzP5joPXGIjQoB+lyzEJ3jdKR:VOJE/tUo2jmkpthCzP5EP2iQZYiTs

Malware Config

Targets

    • Target

      9db37f214f177e141981dba83d4c27336176909e1396e7026d4a87656c324610

    • Size

      4.5MB

    • MD5

      cb1ec9ffe7b481b867a6a939494f1fa3

    • SHA1

      e62333030df25ddd7812552a0afd765bd4cfd7e3

    • SHA256

      9db37f214f177e141981dba83d4c27336176909e1396e7026d4a87656c324610

    • SHA512

      d346dcecf61ccfb5fcdfdc8f52dab31faf7b4bf33ab976dbb2af67c4ac4bcfb6aa4bab2edb87bb7b0a05beb2191a604d3a657ab9300f543b56a786cdb0401e9a

    • SSDEEP

      49152:woaKaJJEq9+zJUHaxup4v12M6MUmgLptOyCzP5joPXGIjQoB+lyzEJ3jdKR:VOJE/tUo2jmkpthCzP5EP2iQZYiTs

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks