General

  • Target

    c17038a8ac6aa5958e3f632449fc804c3795f17ac3aaa605f8518157ff0b2082

  • Size

    4.4MB

  • Sample

    221124-ygpwbahg7z

  • MD5

    5f0901c06cea0b0246fa11e1acf896f6

  • SHA1

    2d5442f0634450fb170abf2c237284baa608e9ec

  • SHA256

    c17038a8ac6aa5958e3f632449fc804c3795f17ac3aaa605f8518157ff0b2082

  • SHA512

    48636283273eee96e2c45199918ccb909310deffbfe07ac974d7691ce1b80b915a20557de8c4112dd97ac57e605f886d75ed36fa6aad4d4ebd8fad00504e7a0e

  • SSDEEP

    49152:RWaKa+PBvRfhyUHDxup4Hqea6HdGKvghxfki1Rc7SKMyoC3yE/Ac5mWxnmyU:YhPBVcUcFjKc07SKzoWNAxenl

Malware Config

Targets

    • Target

      c17038a8ac6aa5958e3f632449fc804c3795f17ac3aaa605f8518157ff0b2082

    • Size

      4.4MB

    • MD5

      5f0901c06cea0b0246fa11e1acf896f6

    • SHA1

      2d5442f0634450fb170abf2c237284baa608e9ec

    • SHA256

      c17038a8ac6aa5958e3f632449fc804c3795f17ac3aaa605f8518157ff0b2082

    • SHA512

      48636283273eee96e2c45199918ccb909310deffbfe07ac974d7691ce1b80b915a20557de8c4112dd97ac57e605f886d75ed36fa6aad4d4ebd8fad00504e7a0e

    • SSDEEP

      49152:RWaKa+PBvRfhyUHDxup4Hqea6HdGKvghxfki1Rc7SKMyoC3yE/Ac5mWxnmyU:YhPBVcUcFjKc07SKzoWNAxenl

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks