General

  • Target

    7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b

  • Size

    4.2MB

  • Sample

    221124-3ygcqage42

  • MD5

    44692a887d2b9f65b57ecf5b5661e9de

  • SHA1

    969c806d34d0662e78faf15ade5e6a7e1e0c5c94

  • SHA256

    7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b

  • SHA512

    0a4881758dbb180e6546007fb54a0ebd389755bf866a77345afa78bc067c815780c3e246a720f4e4913536c3d4ab725ed6df24fb67bc98d3328c684658645d25

  • SSDEEP

    98304:e9HCYdVemdSAIGXZlA81sO5GZ/oLTr9nqHb+Sh:O3XA81sO5ugLVqHb+

Malware Config

Targets

    • Target

      7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b

    • Size

      4.2MB

    • MD5

      44692a887d2b9f65b57ecf5b5661e9de

    • SHA1

      969c806d34d0662e78faf15ade5e6a7e1e0c5c94

    • SHA256

      7133759ed41f01f16028161f77e92bd487d796911da5219c2510699273f73c2b

    • SHA512

      0a4881758dbb180e6546007fb54a0ebd389755bf866a77345afa78bc067c815780c3e246a720f4e4913536c3d4ab725ed6df24fb67bc98d3328c684658645d25

    • SSDEEP

      98304:e9HCYdVemdSAIGXZlA81sO5GZ/oLTr9nqHb+Sh:O3XA81sO5ugLVqHb+

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks