General

  • Target

    c34d0b210fe6d16a48360e1ec442009b088499d26d6d567003d4be950848ef91

  • Size

    931KB

  • Sample

    221124-ydhylaee24

  • MD5

    29be76f8903903d1216af9a0a7690acf

  • SHA1

    a8eae25ecfa7412cfada921a8b61d43e41d4f912

  • SHA256

    c34d0b210fe6d16a48360e1ec442009b088499d26d6d567003d4be950848ef91

  • SHA512

    6b8ddf8a1e6203a6a20683a5503c6fa504e554d2f16cb57817c82eda25813637c73232e393861faa7c2ff7bc96212ef9cbef89cd397b9788439bffc58b0c8c01

  • SSDEEP

    24576:h1OYdaOCCZ/iWCvu/2sWsJA/jlt+DHhsB:h1OswCpYO/dJJDHhsB

Malware Config

Targets

    • Target

      c34d0b210fe6d16a48360e1ec442009b088499d26d6d567003d4be950848ef91

    • Size

      931KB

    • MD5

      29be76f8903903d1216af9a0a7690acf

    • SHA1

      a8eae25ecfa7412cfada921a8b61d43e41d4f912

    • SHA256

      c34d0b210fe6d16a48360e1ec442009b088499d26d6d567003d4be950848ef91

    • SHA512

      6b8ddf8a1e6203a6a20683a5503c6fa504e554d2f16cb57817c82eda25813637c73232e393861faa7c2ff7bc96212ef9cbef89cd397b9788439bffc58b0c8c01

    • SSDEEP

      24576:h1OYdaOCCZ/iWCvu/2sWsJA/jlt+DHhsB:h1OswCpYO/dJJDHhsB

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks