General

  • Target

    aca975b61deca79e62927d4f4ced91b8eba3c1fa366cd9892942cb263e49b8b2

  • Size

    931KB

  • Sample

    221124-zphyeace4z

  • MD5

    da6a886573b37e56c6fa7dda2f3f42af

  • SHA1

    c462f5275511bd20272c96049219eca325192db5

  • SHA256

    aca975b61deca79e62927d4f4ced91b8eba3c1fa366cd9892942cb263e49b8b2

  • SHA512

    062116608448a6ad7e5d64d2020a2af6dd194b5dae869dd30ab33c30f40054ac9ed0bb82ff32b0970bfcec5dac9b7b989512c44560a1785e26547561c6a0f306

  • SSDEEP

    24576:h1OYdaOkCZ/iWCvu/2sWsJA/jlt+DHhso:h1Os+CpYO/dJJDHhso

Malware Config

Targets

    • Target

      aca975b61deca79e62927d4f4ced91b8eba3c1fa366cd9892942cb263e49b8b2

    • Size

      931KB

    • MD5

      da6a886573b37e56c6fa7dda2f3f42af

    • SHA1

      c462f5275511bd20272c96049219eca325192db5

    • SHA256

      aca975b61deca79e62927d4f4ced91b8eba3c1fa366cd9892942cb263e49b8b2

    • SHA512

      062116608448a6ad7e5d64d2020a2af6dd194b5dae869dd30ab33c30f40054ac9ed0bb82ff32b0970bfcec5dac9b7b989512c44560a1785e26547561c6a0f306

    • SSDEEP

      24576:h1OYdaOkCZ/iWCvu/2sWsJA/jlt+DHhso:h1Os+CpYO/dJJDHhso

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks