General

  • Target

    95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120

  • Size

    386KB

  • Sample

    221125-kjrwssea92

  • MD5

    90a111afb406a5ead8277be2a2a4ca60

  • SHA1

    a6c96ecb5ee175aa33656807939748d6c5202c1b

  • SHA256

    95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120

  • SHA512

    cb8cfe10957906fd5600fd5a805cb50a59ae1dbaec7d17d41a2ad622d3a23956e5d01c76e4391fc633c9f50dd055460c9f018ea9bc565073a5f97bb8c7987326

  • SSDEEP

    3072:dSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbMtJyVdyw:ssqhJMxzJiU5SeLmNSbMtJU5

Malware Config

Targets

    • Target

      95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120

    • Size

      386KB

    • MD5

      90a111afb406a5ead8277be2a2a4ca60

    • SHA1

      a6c96ecb5ee175aa33656807939748d6c5202c1b

    • SHA256

      95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120

    • SHA512

      cb8cfe10957906fd5600fd5a805cb50a59ae1dbaec7d17d41a2ad622d3a23956e5d01c76e4391fc633c9f50dd055460c9f018ea9bc565073a5f97bb8c7987326

    • SSDEEP

      3072:dSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbMtJyVdyw:ssqhJMxzJiU5SeLmNSbMtJU5

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Sets file execution options in registry

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks