General

  • Target

    01f6049d59f92526be8f60eb70be8132041349d3f5d3753bd53bb0291e0fbdfa

  • Size

    910KB

  • Sample

    221125-klx6lahf71

  • MD5

    218e181245104ef15e7ecd9d5e8462f7

  • SHA1

    ca582deaf5f4f3c2c640255374257d2afe0665be

  • SHA256

    01f6049d59f92526be8f60eb70be8132041349d3f5d3753bd53bb0291e0fbdfa

  • SHA512

    854e524a8194b0eedf50341637555db3dfe4fa6e7aadfd90921f5876857524b871c0a6e280ab8ef1a7f57ccc55204dbf30ba12232dd662132eadbb0c6ab04682

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Targets

    • Target

      01f6049d59f92526be8f60eb70be8132041349d3f5d3753bd53bb0291e0fbdfa

    • Size

      910KB

    • MD5

      218e181245104ef15e7ecd9d5e8462f7

    • SHA1

      ca582deaf5f4f3c2c640255374257d2afe0665be

    • SHA256

      01f6049d59f92526be8f60eb70be8132041349d3f5d3753bd53bb0291e0fbdfa

    • SHA512

      854e524a8194b0eedf50341637555db3dfe4fa6e7aadfd90921f5876857524b871c0a6e280ab8ef1a7f57ccc55204dbf30ba12232dd662132eadbb0c6ab04682

    • SSDEEP

      3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks