General

  • Target

    c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45

  • Size

    2.9MB

  • Sample

    221125-eecneshh92

  • MD5

    a5f6fe293b8bf48e9dcdbcfb706e82ec

  • SHA1

    fed1b5dc772776a7ce9c973783f8f28312ae4568

  • SHA256

    c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45

  • SHA512

    a1bf36d02872193974ced1c0d46ac58eecade0ea9d4b4f8e75906f94f00b7f3060db113b018214c8f6282011acef8f954614712f700a62b2dd62b85ba9387ec0

  • SSDEEP

    49152:vnTlyRcDAG06K7UgbTCsj8uKYRQQf73eSLiGfyJuvDgT4yr:7lWcDAP7LbhjrH+fuvD1yr

Malware Config

Targets

    • Target

      c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45

    • Size

      2.9MB

    • MD5

      a5f6fe293b8bf48e9dcdbcfb706e82ec

    • SHA1

      fed1b5dc772776a7ce9c973783f8f28312ae4568

    • SHA256

      c8f2334942cc2d4d2a5fc19e04bb2428c010554896f6fee691ca002c3fccab45

    • SHA512

      a1bf36d02872193974ced1c0d46ac58eecade0ea9d4b4f8e75906f94f00b7f3060db113b018214c8f6282011acef8f954614712f700a62b2dd62b85ba9387ec0

    • SSDEEP

      49152:vnTlyRcDAG06K7UgbTCsj8uKYRQQf73eSLiGfyJuvDgT4yr:7lWcDAP7LbhjrH+fuvD1yr

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks