General

  • Target

    f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da

  • Size

    1.4MB

  • Sample

    221125-kltheahf7v

  • MD5

    d238ae7703ab2718b189586a0e5c6bd5

  • SHA1

    4a9c59150e4682c5749902a1c90da24274a5e369

  • SHA256

    f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da

  • SHA512

    8c6a490ea6cbc93f45bb4d45d02da4152d50aa6af52e3c3bccc51058389f16ea083004c7cce6203ebd59c3c738343763707cb23a9417e3f28b0149169e088b1a

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Targets

    • Target

      f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da

    • Size

      1.4MB

    • MD5

      d238ae7703ab2718b189586a0e5c6bd5

    • SHA1

      4a9c59150e4682c5749902a1c90da24274a5e369

    • SHA256

      f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da

    • SHA512

      8c6a490ea6cbc93f45bb4d45d02da4152d50aa6af52e3c3bccc51058389f16ea083004c7cce6203ebd59c3c738343763707cb23a9417e3f28b0149169e088b1a

    • SSDEEP

      3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks