General

  • Target

    d0431147924a590f08f7c5433a4d0eef.bin

  • Size

    1.8MB

  • Sample

    230123-lytvdacg68

  • MD5

    69ea927f621f932c57f6250679bb6f6c

  • SHA1

    f7972ab4444e3c08025cdc2a7739dccd954d5861

  • SHA256

    1bf34ca64e09579fb23c60d364c2fc69cb09652aa1154f4ca0ff7fdb105a172a

  • SHA512

    a2322340ad27f24cad361662782a8372b49ebb6f58fc4fb8ab03b77ae0eef9015b1e8383e205273c25544862333f220bfcef7a3d90783ad317650a587bb09b31

  • SSDEEP

    49152:w0yFC8HC8QUu30xfdTYYg7ObRDUivheseVILCDE72tryf:w0gC8i8QU/LhzFLCg3f

Malware Config

Targets

    • Target

      e23a10293493e1ac13931fc9b35289fbf876febe72a308803b74fe94910a3f25.exe

    • Size

      3.5MB

    • MD5

      d0431147924a590f08f7c5433a4d0eef

    • SHA1

      83511fc538af81b0ad8ca938f7b0b4fa7f39f901

    • SHA256

      e23a10293493e1ac13931fc9b35289fbf876febe72a308803b74fe94910a3f25

    • SHA512

      68f3ee401dccd403629a1384413c24dc6c5c485ab930406bf74e64ff22ab2766b7a228ed4ce1ce0fb1cd2fd245294684de711ee2edbb98d72cf5f2bba1cdbcfe

    • SSDEEP

      98304:q43CzgnDP6NZWCcjj+15yjpV/82TJNK+gT9/69CzFX7P7CbM5zD6sILTjblMS0u:vdV/pNK+gMwzpi4osI3jhMSN

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks