General

  • Target

    b27424b22e0044db604eb392832a170b72586728808523bc0a5209ec3d088714

  • Size

    1.1MB

  • Sample

    230103-nzrgraee6t

  • MD5

    adce26417712d1ed03ac5e5a354b8727

  • SHA1

    260284b97b92e29a67efab7c91018ffbfbd7d605

  • SHA256

    b27424b22e0044db604eb392832a170b72586728808523bc0a5209ec3d088714

  • SHA512

    23caa60042369e23f60b91f45760e72a686df7569101bacdc8003946603fba04369c4c41dacb8e13fa84d0e997505473814b54aa5102e5b8a110da4ad8408d26

  • SSDEEP

    24576:76COk+2ZMFfzcE2q0W6tuqC7ciMoi9aUFTeRLv0pPTtN:T0Lcvq0+qC7ciMyhZcp

Malware Config

Targets

    • Target

      b27424b22e0044db604eb392832a170b72586728808523bc0a5209ec3d088714

    • Size

      1.1MB

    • MD5

      adce26417712d1ed03ac5e5a354b8727

    • SHA1

      260284b97b92e29a67efab7c91018ffbfbd7d605

    • SHA256

      b27424b22e0044db604eb392832a170b72586728808523bc0a5209ec3d088714

    • SHA512

      23caa60042369e23f60b91f45760e72a686df7569101bacdc8003946603fba04369c4c41dacb8e13fa84d0e997505473814b54aa5102e5b8a110da4ad8408d26

    • SSDEEP

      24576:76COk+2ZMFfzcE2q0W6tuqC7ciMoi9aUFTeRLv0pPTtN:T0Lcvq0+qC7ciMyhZcp

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks