General

  • Target

    74921aa068667781bfd5ebedae3dc0d83d3258687c78f41e3f04732b618058f0

  • Size

    1014KB

  • Sample

    221228-tfqn1adh2x

  • MD5

    137447ffeb8a4645f7b2b9e860c3de44

  • SHA1

    51112d93be504cb77cc6fdf46da43d062b4badb3

  • SHA256

    74921aa068667781bfd5ebedae3dc0d83d3258687c78f41e3f04732b618058f0

  • SHA512

    76a2de757a37928809d70d8d40bc777de7c91df9a37068d9de50e10e8f69b341549e0a0a3aa8ad9e10e91e7658483d95bef717dc2e266d6e661eeb61d1179591

  • SSDEEP

    24576:6ej0WWh0ShKGDa5bOKml9NiLSnHGs5OvAgi30:6A4LKkFKmRiLSmUL0

Malware Config

Targets

    • Target

      74921aa068667781bfd5ebedae3dc0d83d3258687c78f41e3f04732b618058f0

    • Size

      1014KB

    • MD5

      137447ffeb8a4645f7b2b9e860c3de44

    • SHA1

      51112d93be504cb77cc6fdf46da43d062b4badb3

    • SHA256

      74921aa068667781bfd5ebedae3dc0d83d3258687c78f41e3f04732b618058f0

    • SHA512

      76a2de757a37928809d70d8d40bc777de7c91df9a37068d9de50e10e8f69b341549e0a0a3aa8ad9e10e91e7658483d95bef717dc2e266d6e661eeb61d1179591

    • SSDEEP

      24576:6ej0WWh0ShKGDa5bOKml9NiLSnHGs5OvAgi30:6A4LKkFKmRiLSmUL0

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks