General

  • Target

    ChromSetup.exe

  • Size

    1.6MB

  • Sample

    221125-y5l5bscg63

  • MD5

    5fa5cb39bf102d13ff7d2f3e62b8405f

  • SHA1

    a1574604b05fcec794a0a718108daad1c852b2e0

  • SHA256

    766b6899cf34e1b56e01a6c9e00842f3855febb8fb2148a3f542c57c40038367

  • SHA512

    f02864a53368052225c334c30ea2c17a78218484fae88c1122053c99d2fa0147ebe42be20d662ba344a8b40851744f4c0527c6174f33eafd9d0a93665655f7ac

  • SSDEEP

    24576:s7FUDowAyrTVE3U5FRQBx6/pBh2FQ7iiqW4OzV5wf:sBuZrEUaoB0FQOxWXe

Malware Config

Targets

    • Target

      ChromSetup.exe

    • Size

      1.6MB

    • MD5

      5fa5cb39bf102d13ff7d2f3e62b8405f

    • SHA1

      a1574604b05fcec794a0a718108daad1c852b2e0

    • SHA256

      766b6899cf34e1b56e01a6c9e00842f3855febb8fb2148a3f542c57c40038367

    • SHA512

      f02864a53368052225c334c30ea2c17a78218484fae88c1122053c99d2fa0147ebe42be20d662ba344a8b40851744f4c0527c6174f33eafd9d0a93665655f7ac

    • SSDEEP

      24576:s7FUDowAyrTVE3U5FRQBx6/pBh2FQ7iiqW4OzV5wf:sBuZrEUaoB0FQOxWXe

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks