General

  • Target

    bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990

  • Size

    4.2MB

  • Sample

    221124-pzw8nshc7w

  • MD5

    3d7dd8d68dbbd73c7f050e1d4e9cb811

  • SHA1

    df08364c94c2ad4ae9b6e5d3f0070fd9c5c01edc

  • SHA256

    bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990

  • SHA512

    877108068ecc5393429a04d018811f13380ad9b5ba099ceaf2dd6e7035fd9a0d6badc5973d299fa2f1219f756ff59c0be46249a24c2a9039ad3d2cf1f89e7c6d

  • SSDEEP

    49152:KIGKW46/4dVemXfVCxdYgcsVrxR9VaG1tYp0O408fB+Nf/tyUReq7TLzbv:N5W54dVem9C4ghXv1Gt/tvR3z

Malware Config

Targets

    • Target

      bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990

    • Size

      4.2MB

    • MD5

      3d7dd8d68dbbd73c7f050e1d4e9cb811

    • SHA1

      df08364c94c2ad4ae9b6e5d3f0070fd9c5c01edc

    • SHA256

      bc87529b1526c1063e91a8182166a12c6d670378f0798341c1bca78147fad990

    • SHA512

      877108068ecc5393429a04d018811f13380ad9b5ba099ceaf2dd6e7035fd9a0d6badc5973d299fa2f1219f756ff59c0be46249a24c2a9039ad3d2cf1f89e7c6d

    • SSDEEP

      49152:KIGKW46/4dVemXfVCxdYgcsVrxR9VaG1tYp0O408fB+Nf/tyUReq7TLzbv:N5W54dVem9C4ghXv1Gt/tvR3z

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks