General

  • Target

    12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91

  • Size

    1.3MB

  • Sample

    221125-kxjgksac71

  • MD5

    b709fe0a934ea6ff67b4381f59df3e94

  • SHA1

    fbc7b851bc8ba989ba072aad6d41a989e2942baf

  • SHA256

    12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91

  • SHA512

    e64d432a3cc9a9fdc12678e0e984c1cf50d6474dc65c9d1f7dc8bd341e37ffd8e715757c2ac9d2477e47d4db1fa949a30250eda111d7a1232b87cdc1343d9c8f

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Targets

    • Target

      12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91

    • Size

      1.3MB

    • MD5

      b709fe0a934ea6ff67b4381f59df3e94

    • SHA1

      fbc7b851bc8ba989ba072aad6d41a989e2942baf

    • SHA256

      12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91

    • SHA512

      e64d432a3cc9a9fdc12678e0e984c1cf50d6474dc65c9d1f7dc8bd341e37ffd8e715757c2ac9d2477e47d4db1fa949a30250eda111d7a1232b87cdc1343d9c8f

    • SSDEEP

      3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Sets file execution options in registry

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks