General

  • Target

    3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6

  • Size

    3.1MB

  • Sample

    221125-jwabvaga41

  • MD5

    b6372befbd19923949c9a7c09ce9a165

  • SHA1

    bcb15557790f4a3824b149f79d397157baef7e1a

  • SHA256

    3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6

  • SHA512

    b5e700515a2f0d9e925d46323f650fb125fea8a0877f69eb6a30f72b7b6e5add88eb26827e4672a8397513a6f99f484a72f5accdf244cc8d99408c9dbf46cbb4

  • SSDEEP

    49152:/0P1dPTfGFXbWydMmvDwAYIun1bdzRUhPXV48ntDQFIUDCGxw6ry/J6fj:cIdMm0IccvJnw9Zu/J6

Malware Config

Targets

    • Target

      3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6

    • Size

      3.1MB

    • MD5

      b6372befbd19923949c9a7c09ce9a165

    • SHA1

      bcb15557790f4a3824b149f79d397157baef7e1a

    • SHA256

      3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6

    • SHA512

      b5e700515a2f0d9e925d46323f650fb125fea8a0877f69eb6a30f72b7b6e5add88eb26827e4672a8397513a6f99f484a72f5accdf244cc8d99408c9dbf46cbb4

    • SSDEEP

      49152:/0P1dPTfGFXbWydMmvDwAYIun1bdzRUhPXV48ntDQFIUDCGxw6ry/J6fj:cIdMm0IccvJnw9Zu/J6

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks