General

  • Target

    eaf438d1ccfde79b19192e90644fdd737193efa5a670d37f3240cc63373dfdf9

  • Size

    4.4MB

  • Sample

    221124-v1g32acf9t

  • MD5

    3789e62bc96cd6ee3133ad57ebfa79fc

  • SHA1

    1d1cd2d1607ba7e10f18ebbf0d6e57de19d6c44e

  • SHA256

    eaf438d1ccfde79b19192e90644fdd737193efa5a670d37f3240cc63373dfdf9

  • SHA512

    52c1f93e31abaa20bf9cf0f2cb6aff547cbe79e5441e9f39428744e65ec6cf172f91d50e23e14e93797c1ec51c47ea20830ef2f5359b13b40d2bff5a38c2b35f

  • SSDEEP

    49152:NWaKa+PBvRfhyUHDxup48o8XOjKzuFYdki9buOBqFMjSlM/Zf0weeDNxwU:EhPBVcU2OjK9kubuOBqFMj8MNtLNxw

Malware Config

Targets

    • Target

      eaf438d1ccfde79b19192e90644fdd737193efa5a670d37f3240cc63373dfdf9

    • Size

      4.4MB

    • MD5

      3789e62bc96cd6ee3133ad57ebfa79fc

    • SHA1

      1d1cd2d1607ba7e10f18ebbf0d6e57de19d6c44e

    • SHA256

      eaf438d1ccfde79b19192e90644fdd737193efa5a670d37f3240cc63373dfdf9

    • SHA512

      52c1f93e31abaa20bf9cf0f2cb6aff547cbe79e5441e9f39428744e65ec6cf172f91d50e23e14e93797c1ec51c47ea20830ef2f5359b13b40d2bff5a38c2b35f

    • SSDEEP

      49152:NWaKa+PBvRfhyUHDxup48o8XOjKzuFYdki9buOBqFMjSlM/Zf0weeDNxwU:EhPBVcU2OjK9kubuOBqFMj8MNtLNxw

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks