General

  • Target

    0e82089a9d42eb9a0a208bb6e6f969089fa57a1c69f9f0df40b6f61b18e833a1

  • Size

    2.7MB

  • Sample

    221125-flt2qaga3t

  • MD5

    e3391d8b14b410e7b61f4189750e2d39

  • SHA1

    e610daad21331fa020cbc7d3a04b7caa0e4c9e91

  • SHA256

    0e82089a9d42eb9a0a208bb6e6f969089fa57a1c69f9f0df40b6f61b18e833a1

  • SHA512

    63ba5b8f84c44eee63d6a43c5de1f39b2efde1d827abace1bce52ecf8eb96cea048f783af6849b4579c6b5300428b8c6ba32dc01d5ce8ddcf076942ca5bb1c52

  • SSDEEP

    49152:Eq+WYDE7242/oUfCI20dk+xeb3pNA1o927BTqtrL16jDoDPW5In:EDF4tIlk+gbfWoI1K6wDPA

Malware Config

Targets

    • Target

      0e82089a9d42eb9a0a208bb6e6f969089fa57a1c69f9f0df40b6f61b18e833a1

    • Size

      2.7MB

    • MD5

      e3391d8b14b410e7b61f4189750e2d39

    • SHA1

      e610daad21331fa020cbc7d3a04b7caa0e4c9e91

    • SHA256

      0e82089a9d42eb9a0a208bb6e6f969089fa57a1c69f9f0df40b6f61b18e833a1

    • SHA512

      63ba5b8f84c44eee63d6a43c5de1f39b2efde1d827abace1bce52ecf8eb96cea048f783af6849b4579c6b5300428b8c6ba32dc01d5ce8ddcf076942ca5bb1c52

    • SSDEEP

      49152:Eq+WYDE7242/oUfCI20dk+xeb3pNA1o927BTqtrL16jDoDPW5In:EDF4tIlk+gbfWoI1K6wDPA

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks