General

  • Target

    84fcfc88df2041347b749df08d82fdb951f0335567ac9e5f1828e84084542e1f

  • Size

    310KB

  • Sample

    230110-xl4dtshb38

  • MD5

    bfa8a9fb3fc5dd5871686524552bb277

  • SHA1

    67a72ade907cbf6f0540eb9228c292884ab86314

  • SHA256

    84fcfc88df2041347b749df08d82fdb951f0335567ac9e5f1828e84084542e1f

  • SHA512

    4f2b263d2e21b9903d830f1cf896366e8827d9d27edd13b2ef082bfe803ca36f0abc02298ff0b8e96d6c5bc0f4c7d960f185c29f1768a22c86c970ec0ce579b3

  • SSDEEP

    6144:fknwcK1IdLueECWgq/T0rLYA2Kr/M2cj8VSaPwBsOr6keiV:swZ4ujgqYYA2KzMvj8Nw6y

Malware Config

Targets

    • Target

      84fcfc88df2041347b749df08d82fdb951f0335567ac9e5f1828e84084542e1f

    • Size

      310KB

    • MD5

      bfa8a9fb3fc5dd5871686524552bb277

    • SHA1

      67a72ade907cbf6f0540eb9228c292884ab86314

    • SHA256

      84fcfc88df2041347b749df08d82fdb951f0335567ac9e5f1828e84084542e1f

    • SHA512

      4f2b263d2e21b9903d830f1cf896366e8827d9d27edd13b2ef082bfe803ca36f0abc02298ff0b8e96d6c5bc0f4c7d960f185c29f1768a22c86c970ec0ce579b3

    • SSDEEP

      6144:fknwcK1IdLueECWgq/T0rLYA2Kr/M2cj8VSaPwBsOr6keiV:swZ4ujgqYYA2KzMvj8Nw6y

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks