General

  • Target

    9894d3437d1ed10d62ad91067288d392a3d08be2c621b6e77bc84c6acbd43ab5

  • Size

    758KB

  • Sample

    221203-gmavxadg9s

  • MD5

    6a512917b021d895f27e1a54efc42470

  • SHA1

    aa495ee0b68087f6ee25cc5ab2678c435553be13

  • SHA256

    9894d3437d1ed10d62ad91067288d392a3d08be2c621b6e77bc84c6acbd43ab5

  • SHA512

    6ce0430c049a7f6e60f0eb2b6d4b655d5cc9ac0530aaf7c0de3e8052355bf7f3625bc5c9f51fd24b10045a41ddb97798017c6f5cd76a22d04224d57f9f79c469

  • SSDEEP

    12288:YgitGs0IsFqnea0T001Sp+IbGW9PfG9Fu8aqL6P/P2aUXreOaU:xitV0IsFKenw01YKWPpq+PH2aU7edU

Malware Config

Targets

    • Target

      9894d3437d1ed10d62ad91067288d392a3d08be2c621b6e77bc84c6acbd43ab5

    • Size

      758KB

    • MD5

      6a512917b021d895f27e1a54efc42470

    • SHA1

      aa495ee0b68087f6ee25cc5ab2678c435553be13

    • SHA256

      9894d3437d1ed10d62ad91067288d392a3d08be2c621b6e77bc84c6acbd43ab5

    • SHA512

      6ce0430c049a7f6e60f0eb2b6d4b655d5cc9ac0530aaf7c0de3e8052355bf7f3625bc5c9f51fd24b10045a41ddb97798017c6f5cd76a22d04224d57f9f79c469

    • SSDEEP

      12288:YgitGs0IsFqnea0T001Sp+IbGW9PfG9Fu8aqL6P/P2aUXreOaU:xitV0IsFKenw01YKWPpq+PH2aU7edU

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks