General

  • Target

    file.exe

  • Size

    1016KB

  • Sample

    221124-t1yv4saf3z

  • MD5

    c494dea14e40bc2522328becb71c2ac6

  • SHA1

    13bf831b6c3999dea0b6db52f1fd95dae08cb6aa

  • SHA256

    cda8ffa2a84daf8097f5ca919b6b350cd30b697565bbae6d8adbfab217d476e8

  • SHA512

    3964a031c0e60c33061662b6d2d0896a794dbb3c03927fd1db26bd1fc8f0b4bb901b93e23bf1e6c2d67869deb475631b488744759c77c68ad413b3b0297ca0e7

  • SSDEEP

    24576:81aNasQTghCrmuqdTT088P+HYS60aWCIdbcBVA:8oNJQTaCC9dTT08NHYSEx

Malware Config

Targets

    • Target

      file.exe

    • Size

      1016KB

    • MD5

      c494dea14e40bc2522328becb71c2ac6

    • SHA1

      13bf831b6c3999dea0b6db52f1fd95dae08cb6aa

    • SHA256

      cda8ffa2a84daf8097f5ca919b6b350cd30b697565bbae6d8adbfab217d476e8

    • SHA512

      3964a031c0e60c33061662b6d2d0896a794dbb3c03927fd1db26bd1fc8f0b4bb901b93e23bf1e6c2d67869deb475631b488744759c77c68ad413b3b0297ca0e7

    • SSDEEP

      24576:81aNasQTghCrmuqdTT088P+HYS60aWCIdbcBVA:8oNJQTaCC9dTT08NHYSEx

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

2
T1114

Tasks