General

  • Target

    f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8

  • Size

    4.6MB

  • Sample

    221124-vdflpabd5y

  • MD5

    deccbdcc495fd0426959cfbb72b4a0df

  • SHA1

    ef872a61a81f609711cd458c68357a8692246b2c

  • SHA256

    f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8

  • SHA512

    72c6025be5c19349cf20de36d7c9f377a47dfff8e01d34297747c48603d13c24523f6938b6ae87acf3b2105dbfb35cdbd9e8bc9e55d20fa11855fad257b163e5

  • SSDEEP

    49152:9iBJ2SpAZG133gmLEI10XOv0TP6oYlCXTAkA+ZuK2rFPIWoiwVdNFWPE/B/u:sUMp13QmQI10XOcTP+mrcZHf+Wc/d

Malware Config

Targets

    • Target

      f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8

    • Size

      4.6MB

    • MD5

      deccbdcc495fd0426959cfbb72b4a0df

    • SHA1

      ef872a61a81f609711cd458c68357a8692246b2c

    • SHA256

      f64ffa7c6b17e8b0dc6cab0e4c3665f85861e6f87b8b318eb39448550bf3c7d8

    • SHA512

      72c6025be5c19349cf20de36d7c9f377a47dfff8e01d34297747c48603d13c24523f6938b6ae87acf3b2105dbfb35cdbd9e8bc9e55d20fa11855fad257b163e5

    • SSDEEP

      49152:9iBJ2SpAZG133gmLEI10XOv0TP6oYlCXTAkA+ZuK2rFPIWoiwVdNFWPE/B/u:sUMp13QmQI10XOcTP+mrcZHf+Wc/d

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks