General

  • Target

    b62dcc4918f22a34c7e1cdb4fdb001669d231808df4d7dc7df845393f780553a

  • Size

    1018KB

  • Sample

    221125-j57npsgf6y

  • MD5

    79ae8e6e93f416139a7c646821f3ca0f

  • SHA1

    dabd536b32996b5f1ca11fa265f0e5e4acdbd5bb

  • SHA256

    b62dcc4918f22a34c7e1cdb4fdb001669d231808df4d7dc7df845393f780553a

  • SHA512

    f60fc41c07b46c1a6a6032d0d725787fb8006156051de7c5501ade22962683c27b76c342369789374da510a034d5f077adef22b87720905f46e5269e62e39cac

  • SSDEEP

    24576:4KN7lSrgpYRnx8hKWuqHu20FZzR6mC9ftT:4QRJ4xqfHz0/U31

Malware Config

Targets

    • Target

      b62dcc4918f22a34c7e1cdb4fdb001669d231808df4d7dc7df845393f780553a

    • Size

      1018KB

    • MD5

      79ae8e6e93f416139a7c646821f3ca0f

    • SHA1

      dabd536b32996b5f1ca11fa265f0e5e4acdbd5bb

    • SHA256

      b62dcc4918f22a34c7e1cdb4fdb001669d231808df4d7dc7df845393f780553a

    • SHA512

      f60fc41c07b46c1a6a6032d0d725787fb8006156051de7c5501ade22962683c27b76c342369789374da510a034d5f077adef22b87720905f46e5269e62e39cac

    • SSDEEP

      24576:4KN7lSrgpYRnx8hKWuqHu20FZzR6mC9ftT:4QRJ4xqfHz0/U31

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks