General

  • Target

    46f7a432514efd53ba56138ab70783e5d2fcf640e454bf82520fe6197c696e05

  • Size

    931KB

  • Sample

    221125-chzagsgg2s

  • MD5

    2e5ab5be5fb41756c134418952511b59

  • SHA1

    1377191c4eaf0e3e09d2de5f8c72b9a982d8d279

  • SHA256

    46f7a432514efd53ba56138ab70783e5d2fcf640e454bf82520fe6197c696e05

  • SHA512

    4cf850e4d5dde5e071597aa56b848bddb7b32e63753e8a21c039e6b1cf9bc414902b372383a63e777efc873552d193daed1ac4c59865835f28dd5992a0957944

  • SSDEEP

    24576:h1OYdaOLCZ/iWCvu/2sWsJA/jlt+DHhsa:h1OsZCpYO/dJJDHhsa

Malware Config

Targets

    • Target

      46f7a432514efd53ba56138ab70783e5d2fcf640e454bf82520fe6197c696e05

    • Size

      931KB

    • MD5

      2e5ab5be5fb41756c134418952511b59

    • SHA1

      1377191c4eaf0e3e09d2de5f8c72b9a982d8d279

    • SHA256

      46f7a432514efd53ba56138ab70783e5d2fcf640e454bf82520fe6197c696e05

    • SHA512

      4cf850e4d5dde5e071597aa56b848bddb7b32e63753e8a21c039e6b1cf9bc414902b372383a63e777efc873552d193daed1ac4c59865835f28dd5992a0957944

    • SSDEEP

      24576:h1OYdaOLCZ/iWCvu/2sWsJA/jlt+DHhsa:h1OsZCpYO/dJJDHhsa

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks