General

  • Target

    834a7429f98efdb62b6dc6cd76922e6108906810e4b169e8af18081c9db6a7a2

  • Size

    1.7MB

  • Sample

    221125-kslfdaaa9t

  • MD5

    7ba4cbd920088fa5a9bf5a144c9834bb

  • SHA1

    caa83f4ec6286d58ecc56fc9dfaa650f765b6868

  • SHA256

    834a7429f98efdb62b6dc6cd76922e6108906810e4b169e8af18081c9db6a7a2

  • SHA512

    0311af7730177fdfa09c0faf41abe73c2a3ef800edfce78cb999912449cafabd006ca15d1f2e231b06372c240ab97f9cc203f01b5e2ed2d04afefb98d0a66d87

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Targets

    • Target

      834a7429f98efdb62b6dc6cd76922e6108906810e4b169e8af18081c9db6a7a2

    • Size

      1.7MB

    • MD5

      7ba4cbd920088fa5a9bf5a144c9834bb

    • SHA1

      caa83f4ec6286d58ecc56fc9dfaa650f765b6868

    • SHA256

      834a7429f98efdb62b6dc6cd76922e6108906810e4b169e8af18081c9db6a7a2

    • SHA512

      0311af7730177fdfa09c0faf41abe73c2a3ef800edfce78cb999912449cafabd006ca15d1f2e231b06372c240ab97f9cc203f01b5e2ed2d04afefb98d0a66d87

    • SSDEEP

      3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks