General

  • Target

    3e8fd0702a4738390b08a3c64563348cceec655b816d3785f9898ff8e6ad6030

  • Size

    1.2MB

  • Sample

    221125-jwnt8sga6v

  • MD5

    f485974fdb00f11a5cc0d5a893c7452a

  • SHA1

    1b25ea1cccfb80ee8a09c03ba8b2455c09f3169c

  • SHA256

    3e8fd0702a4738390b08a3c64563348cceec655b816d3785f9898ff8e6ad6030

  • SHA512

    a259bfa036909f5cfe1fbeac24f83d1670ffe68a01f5f61d9aebea02caaeb3023d1ca24f3afb71ac1c712137ed3f0f4d3195d243e8a65436bcd71cc72ecf462d

  • SSDEEP

    24576:8pd89aPgGKd1cNk1UrtFdx1wM4f2ejzM7VybWPBCk7aQrxiE:eAaPjrtFdxEjIcSPBCk7aQrxiE

Malware Config

Targets

    • Target

      3e8fd0702a4738390b08a3c64563348cceec655b816d3785f9898ff8e6ad6030

    • Size

      1.2MB

    • MD5

      f485974fdb00f11a5cc0d5a893c7452a

    • SHA1

      1b25ea1cccfb80ee8a09c03ba8b2455c09f3169c

    • SHA256

      3e8fd0702a4738390b08a3c64563348cceec655b816d3785f9898ff8e6ad6030

    • SHA512

      a259bfa036909f5cfe1fbeac24f83d1670ffe68a01f5f61d9aebea02caaeb3023d1ca24f3afb71ac1c712137ed3f0f4d3195d243e8a65436bcd71cc72ecf462d

    • SSDEEP

      24576:8pd89aPgGKd1cNk1UrtFdx1wM4f2ejzM7VybWPBCk7aQrxiE:eAaPjrtFdxEjIcSPBCk7aQrxiE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks