General

  • Target

    68c4561984307b8845e8ee6994237d3d229f6f136b4781d6a4a575228845f4fe

  • Size

    1.5MB

  • Sample

    221126-2zbm7abf35

  • MD5

    515a170bfa87120f130add49b4865f6f

  • SHA1

    38ffdd5df8aaf24baeb62010820a7ebe8ab3ddd0

  • SHA256

    68c4561984307b8845e8ee6994237d3d229f6f136b4781d6a4a575228845f4fe

  • SHA512

    2e3bbbb06634e4aacae7e33c3288427fcb76022c20f82413bd484fa639eeeb219f11225f9cf627bf295bc3143e288249246574632c6cbf28663adc4840a9366e

  • SSDEEP

    24576:7HiXNLJwRvQ8obD+n2hWjMMRg8cvII9hZa7deQpxtfLQEcmrrBGq4IYBWQX3aSdX:G9+2D+n2hW1Rg8c52xDaExrtYBWS3JdX

Malware Config

Targets

    • Target

      68c4561984307b8845e8ee6994237d3d229f6f136b4781d6a4a575228845f4fe

    • Size

      1.5MB

    • MD5

      515a170bfa87120f130add49b4865f6f

    • SHA1

      38ffdd5df8aaf24baeb62010820a7ebe8ab3ddd0

    • SHA256

      68c4561984307b8845e8ee6994237d3d229f6f136b4781d6a4a575228845f4fe

    • SHA512

      2e3bbbb06634e4aacae7e33c3288427fcb76022c20f82413bd484fa639eeeb219f11225f9cf627bf295bc3143e288249246574632c6cbf28663adc4840a9366e

    • SSDEEP

      24576:7HiXNLJwRvQ8obD+n2hWjMMRg8cvII9hZa7deQpxtfLQEcmrrBGq4IYBWQX3aSdX:G9+2D+n2hW1Rg8c52xDaExrtYBWS3JdX

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks