General

  • Target

    06968dd8e1baf71cf9944c4b6ade43b66de8acfa011204af2e603f1a636b094f

  • Size

    3.7MB

  • Sample

    221128-hzyyyaad7w

  • MD5

    a8e61c3183991dbd0de9cbd69983db89

  • SHA1

    2ea73ba33d50e8c78555f8d9eafb3c436e6fb11d

  • SHA256

    06968dd8e1baf71cf9944c4b6ade43b66de8acfa011204af2e603f1a636b094f

  • SHA512

    9e3350f3c4dba762cc39551d12eabe80997c1e5293241c5e345646334c042c9f28db55309567fea55c16c277533c24cddf27ff337229038b0b189a5a1d992f49

  • SSDEEP

    98304:bvU6bKreKg1Yl2E1VqNvxLWY4X3OB4UaC:bvFbKRg1YEExbX+B

Malware Config

Targets

    • Target

      06968dd8e1baf71cf9944c4b6ade43b66de8acfa011204af2e603f1a636b094f

    • Size

      3.7MB

    • MD5

      a8e61c3183991dbd0de9cbd69983db89

    • SHA1

      2ea73ba33d50e8c78555f8d9eafb3c436e6fb11d

    • SHA256

      06968dd8e1baf71cf9944c4b6ade43b66de8acfa011204af2e603f1a636b094f

    • SHA512

      9e3350f3c4dba762cc39551d12eabe80997c1e5293241c5e345646334c042c9f28db55309567fea55c16c277533c24cddf27ff337229038b0b189a5a1d992f49

    • SSDEEP

      98304:bvU6bKreKg1Yl2E1VqNvxLWY4X3OB4UaC:bvFbKRg1YEExbX+B

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

2
T1114

Tasks