General

  • Target

    e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a

  • Size

    1.1MB

  • Sample

    221125-katzssde57

  • MD5

    fcf2f679e2b3bfeafaf385af4a25eb61

  • SHA1

    a5407da3447f9fa11c4541892efd7e0582349fe7

  • SHA256

    e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a

  • SHA512

    56821b24a31ed75c6bd2683c8046c0c1ef66093205f9f1f2282246c1ef131df86889405f7692ea42c1e5c8ef21502aa159e045f6ad6a5fceb0f4fb7ff73a5016

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Targets

    • Target

      e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a

    • Size

      1.1MB

    • MD5

      fcf2f679e2b3bfeafaf385af4a25eb61

    • SHA1

      a5407da3447f9fa11c4541892efd7e0582349fe7

    • SHA256

      e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a

    • SHA512

      56821b24a31ed75c6bd2683c8046c0c1ef66093205f9f1f2282246c1ef131df86889405f7692ea42c1e5c8ef21502aa159e045f6ad6a5fceb0f4fb7ff73a5016

    • SSDEEP

      3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks