General

  • Target

    de986adf6658e8c6f617278104ad96b3a6cf25d86a2b945b5b1608dc283a6d2b

  • Size

    1.1MB

  • Sample

    230111-aa8svadg8w

  • MD5

    24c38b9d10cc7e577ec9ab387e4ff70c

  • SHA1

    905fb805156d4f510daec55c517b4ee68580d7fd

  • SHA256

    de986adf6658e8c6f617278104ad96b3a6cf25d86a2b945b5b1608dc283a6d2b

  • SHA512

    56007c31bc8576023ae61fbe713dfa5a1a73d86fb87cb8ec3a6ccae76798c8e03c663428359209d6b9732e3c57903a5c226d870bae5980c46a58bee5c74b7b2e

  • SSDEEP

    24576:To0lBCkS94VhoCaLyMzpikpbqc/TRG/WIrT5oxWDd:ToICkWsZtUpbqA1UWwT5o8Z

Malware Config

Targets

    • Target

      de986adf6658e8c6f617278104ad96b3a6cf25d86a2b945b5b1608dc283a6d2b

    • Size

      1.1MB

    • MD5

      24c38b9d10cc7e577ec9ab387e4ff70c

    • SHA1

      905fb805156d4f510daec55c517b4ee68580d7fd

    • SHA256

      de986adf6658e8c6f617278104ad96b3a6cf25d86a2b945b5b1608dc283a6d2b

    • SHA512

      56007c31bc8576023ae61fbe713dfa5a1a73d86fb87cb8ec3a6ccae76798c8e03c663428359209d6b9732e3c57903a5c226d870bae5980c46a58bee5c74b7b2e

    • SSDEEP

      24576:To0lBCkS94VhoCaLyMzpikpbqc/TRG/WIrT5oxWDd:ToICkWsZtUpbqA1UWwT5o8Z

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks