General

  • Target

    dfee7601db502cf783f5ccd683d37116db1927384e93919684d2324755aef330

  • Size

    747KB

  • Sample

    221125-lfmncabe7w

  • MD5

    cbf1f6898e4fb8cd8b0cbe3b68f86489

  • SHA1

    239d25be201f0e27aaa0218b6bde5ab6a0960f67

  • SHA256

    dfee7601db502cf783f5ccd683d37116db1927384e93919684d2324755aef330

  • SHA512

    0f7127cd81edce66886f16fefbb1a372d018d38398f60f9973174f30630e5fabe04c6dd508fe9308fa9b0a9629f7553ad60b70e396e206d53cb93c5b890e7835

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Targets

    • Target

      dfee7601db502cf783f5ccd683d37116db1927384e93919684d2324755aef330

    • Size

      747KB

    • MD5

      cbf1f6898e4fb8cd8b0cbe3b68f86489

    • SHA1

      239d25be201f0e27aaa0218b6bde5ab6a0960f67

    • SHA256

      dfee7601db502cf783f5ccd683d37116db1927384e93919684d2324755aef330

    • SHA512

      0f7127cd81edce66886f16fefbb1a372d018d38398f60f9973174f30630e5fabe04c6dd508fe9308fa9b0a9629f7553ad60b70e396e206d53cb93c5b890e7835

    • SSDEEP

      3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Sets file execution options in registry

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks