General

  • Target

    2cfc4cc2d40903e96ee636c9fc05a32ddf509b85e7716c7817d54a815f057a86

  • Size

    3.7MB

  • Sample

    221125-j1wewacg98

  • MD5

    f53bb81fd8f9632d901e2aee8f20a29f

  • SHA1

    5c305eb43753aa69a7715b7929cee41ade3f6c6c

  • SHA256

    2cfc4cc2d40903e96ee636c9fc05a32ddf509b85e7716c7817d54a815f057a86

  • SHA512

    c157dfb4a88209a9a806d1be308daf6cf4c4089a0e02fa70ada41a00f5c7473fb69a594e5c5bc0b1d62d6fc64bdc0a7aee678206a4d927998f24827fa9940baa

  • SSDEEP

    49152:uoJhb9cleq093LccMTqDn+RG1iVNXSCR9G35FS/0pTb3RfN76B1QEXxSi8:DOCIJqD+RG1ifXSCHG32/yPRf0Bp

Malware Config

Targets

    • Target

      2cfc4cc2d40903e96ee636c9fc05a32ddf509b85e7716c7817d54a815f057a86

    • Size

      3.7MB

    • MD5

      f53bb81fd8f9632d901e2aee8f20a29f

    • SHA1

      5c305eb43753aa69a7715b7929cee41ade3f6c6c

    • SHA256

      2cfc4cc2d40903e96ee636c9fc05a32ddf509b85e7716c7817d54a815f057a86

    • SHA512

      c157dfb4a88209a9a806d1be308daf6cf4c4089a0e02fa70ada41a00f5c7473fb69a594e5c5bc0b1d62d6fc64bdc0a7aee678206a4d927998f24827fa9940baa

    • SSDEEP

      49152:uoJhb9cleq093LccMTqDn+RG1iVNXSCR9G35FS/0pTb3RfN76B1QEXxSi8:DOCIJqD+RG1ifXSCHG32/yPRf0Bp

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks