General

  • Target

    29023d4b5bc179778e8e83d916c0e15a89ea4fac03fe9990629a445aa717dc24

  • Size

    3.5MB

  • Sample

    221125-ygl5esdh51

  • MD5

    43196de1ea54e3385d854d99d9d02230

  • SHA1

    84a1e0d33397e0467ec03141a44d4b440ba3d4c1

  • SHA256

    29023d4b5bc179778e8e83d916c0e15a89ea4fac03fe9990629a445aa717dc24

  • SHA512

    f04fd0f06c0ef14847c77862c021cfbe77ac55c34293bc56c590affec204a5b27fb0e62633b07b458eeb2ea3c980fd49529e12aa3bdd68e7ed2f9b74d93b26f5

  • SSDEEP

    49152:ScboYAWt7MukxmEUa0G6hnl9nkyb3BeZitUQ47nNRsD0rIDS4olxfvQtqGdzL8ql:D8YAWbIeEitd4Zmo8DBGxfvudAy1zg

Malware Config

Targets

    • Target

      29023d4b5bc179778e8e83d916c0e15a89ea4fac03fe9990629a445aa717dc24

    • Size

      3.5MB

    • MD5

      43196de1ea54e3385d854d99d9d02230

    • SHA1

      84a1e0d33397e0467ec03141a44d4b440ba3d4c1

    • SHA256

      29023d4b5bc179778e8e83d916c0e15a89ea4fac03fe9990629a445aa717dc24

    • SHA512

      f04fd0f06c0ef14847c77862c021cfbe77ac55c34293bc56c590affec204a5b27fb0e62633b07b458eeb2ea3c980fd49529e12aa3bdd68e7ed2f9b74d93b26f5

    • SSDEEP

      49152:ScboYAWt7MukxmEUa0G6hnl9nkyb3BeZitUQ47nNRsD0rIDS4olxfvQtqGdzL8ql:D8YAWbIeEitd4Zmo8DBGxfvudAy1zg

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks