General

  • Target

    308884d8629133fed9d0c0cfdaebc6919cbc702e4066eac28c16d220d0d573c5

  • Size

    1.7MB

  • Sample

    221201-s3wm4agb5z

  • MD5

    27ec0edf13234cae2890d014c8a5b730

  • SHA1

    350e50c0b5f964b38bc6f7573a4dc3ff53f892a9

  • SHA256

    308884d8629133fed9d0c0cfdaebc6919cbc702e4066eac28c16d220d0d573c5

  • SHA512

    f871c8fe3388eac2575dc085d8901e8ebdfd606c0898ffd947bf5346464359608fac05d1dee7e926adcaae82b2b7714ad6afcb8fb8ca460914d6dcab71d18560

  • SSDEEP

    49152:gmiroNzur/bc6/nRJ/aOheDkPQcKiwMH5yUKc5thLfrXa7sjybqS9pErw2/6pBL1:gmirHbMlhCLru

Malware Config

Targets

    • Target

      308884d8629133fed9d0c0cfdaebc6919cbc702e4066eac28c16d220d0d573c5

    • Size

      1.7MB

    • MD5

      27ec0edf13234cae2890d014c8a5b730

    • SHA1

      350e50c0b5f964b38bc6f7573a4dc3ff53f892a9

    • SHA256

      308884d8629133fed9d0c0cfdaebc6919cbc702e4066eac28c16d220d0d573c5

    • SHA512

      f871c8fe3388eac2575dc085d8901e8ebdfd606c0898ffd947bf5346464359608fac05d1dee7e926adcaae82b2b7714ad6afcb8fb8ca460914d6dcab71d18560

    • SSDEEP

      49152:gmiroNzur/bc6/nRJ/aOheDkPQcKiwMH5yUKc5thLfrXa7sjybqS9pErw2/6pBL1:gmirHbMlhCLru

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks