General

  • Target

    7234aee628a699c089d1d8e874f4fb54d4c03ab06202bca7c77676c86729cc5c

  • Size

    4.4MB

  • Sample

    221124-3wmrqagd34

  • MD5

    17fa0a0014fbfba98dd07ea256546211

  • SHA1

    c4674d70faee2a8fc6e4c70ab07f1f09a0d3db01

  • SHA256

    7234aee628a699c089d1d8e874f4fb54d4c03ab06202bca7c77676c86729cc5c

  • SHA512

    01563a1a1f55b4fd5aee2fc534429c92c6c2b3fd184c4e87c6c28974308c5b211f431b9c5317c21d212417357905ca230e5ff3afdd24d45fe0de7aff11b2fbcc

  • SSDEEP

    49152:KWaKa+PBvRfhyUHDxup4AhMYppWmD/M2BKQl/OCrZguQpNjSlM/Zf0weeDNx0U:dhPBVcUDYpp1D/YWZgzNj8MNtLNx0

Malware Config

Targets

    • Target

      7234aee628a699c089d1d8e874f4fb54d4c03ab06202bca7c77676c86729cc5c

    • Size

      4.4MB

    • MD5

      17fa0a0014fbfba98dd07ea256546211

    • SHA1

      c4674d70faee2a8fc6e4c70ab07f1f09a0d3db01

    • SHA256

      7234aee628a699c089d1d8e874f4fb54d4c03ab06202bca7c77676c86729cc5c

    • SHA512

      01563a1a1f55b4fd5aee2fc534429c92c6c2b3fd184c4e87c6c28974308c5b211f431b9c5317c21d212417357905ca230e5ff3afdd24d45fe0de7aff11b2fbcc

    • SSDEEP

      49152:KWaKa+PBvRfhyUHDxup4AhMYppWmD/M2BKQl/OCrZguQpNjSlM/Zf0weeDNx0U:dhPBVcUDYpp1D/YWZgzNj8MNtLNx0

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks