General

  • Target

    6df2c19308473d73c7afbbb839b703840b9edb10282a650bff50e6567764dfc3

  • Size

    2.1MB

  • Sample

    221125-lgj9lsgb52

  • MD5

    fb8c5facc879b47e7450bcc02ab51987

  • SHA1

    4c819f1026b5f4960d87c8906f54a66a0e35a037

  • SHA256

    6df2c19308473d73c7afbbb839b703840b9edb10282a650bff50e6567764dfc3

  • SHA512

    ec061153ba730e83fd176d22e2dc3d01b4ad32793755ca44a1a5b6e345f6673cf39a44e28c93e710f802ee213cbbad8b11a15f9a769b96262b5073157f69bbeb

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Targets

    • Target

      6df2c19308473d73c7afbbb839b703840b9edb10282a650bff50e6567764dfc3

    • Size

      2.1MB

    • MD5

      fb8c5facc879b47e7450bcc02ab51987

    • SHA1

      4c819f1026b5f4960d87c8906f54a66a0e35a037

    • SHA256

      6df2c19308473d73c7afbbb839b703840b9edb10282a650bff50e6567764dfc3

    • SHA512

      ec061153ba730e83fd176d22e2dc3d01b4ad32793755ca44a1a5b6e345f6673cf39a44e28c93e710f802ee213cbbad8b11a15f9a769b96262b5073157f69bbeb

    • SSDEEP

      3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks