General

  • Target

    b760f5385bd4c51febb6fae596de0130d7e785bdb0accbe258cf918792c40942

  • Size

    452KB

  • Sample

    221125-lh5xpsgc42

  • MD5

    df92baa5776224b51b9720c65fe51af3

  • SHA1

    c5a4caea6e99064497683feb0f88749b0a93b933

  • SHA256

    b760f5385bd4c51febb6fae596de0130d7e785bdb0accbe258cf918792c40942

  • SHA512

    85d00d9e41d8c29b6c3697cbfabca09d2b1099a85cf76cc042a18d6db2ee01a1e6d8eae42b1e4f70403174ff1d8c35fc40413b6c16a04e5639365cefb929e860

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Targets

    • Target

      b760f5385bd4c51febb6fae596de0130d7e785bdb0accbe258cf918792c40942

    • Size

      452KB

    • MD5

      df92baa5776224b51b9720c65fe51af3

    • SHA1

      c5a4caea6e99064497683feb0f88749b0a93b933

    • SHA256

      b760f5385bd4c51febb6fae596de0130d7e785bdb0accbe258cf918792c40942

    • SHA512

      85d00d9e41d8c29b6c3697cbfabca09d2b1099a85cf76cc042a18d6db2ee01a1e6d8eae42b1e4f70403174ff1d8c35fc40413b6c16a04e5639365cefb929e860

    • SSDEEP

      3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks