General

  • Target

    55d79f4ffb85f9ab4258db21d578a5c878e61ea15875381e1dbcd75d2b956986

  • Size

    553KB

  • Sample

    230129-v1ye1sgh51

  • MD5

    72179861982d1397a73160272eb371bd

  • SHA1

    4f96b95cbb41306db2045b7796718e0d6253e415

  • SHA256

    55d79f4ffb85f9ab4258db21d578a5c878e61ea15875381e1dbcd75d2b956986

  • SHA512

    7123724fe82596c62dfdc1b4be3f27127b3d5521dd29deabe3732a98c812fdd07bb8d974d65f597cfefcdfef2614e2d03ee8782fdfe5cdc1bb6699e81bbf08bc

  • SSDEEP

    12288:nuNxhwjNbNUCv6mbSdC2arVzgtzO5H0bXL0uNtTirdEd:nuNv9C6COJIMEH0MaTEdI

Malware Config

Targets

    • Target

      55d79f4ffb85f9ab4258db21d578a5c878e61ea15875381e1dbcd75d2b956986

    • Size

      553KB

    • MD5

      72179861982d1397a73160272eb371bd

    • SHA1

      4f96b95cbb41306db2045b7796718e0d6253e415

    • SHA256

      55d79f4ffb85f9ab4258db21d578a5c878e61ea15875381e1dbcd75d2b956986

    • SHA512

      7123724fe82596c62dfdc1b4be3f27127b3d5521dd29deabe3732a98c812fdd07bb8d974d65f597cfefcdfef2614e2d03ee8782fdfe5cdc1bb6699e81bbf08bc

    • SSDEEP

      12288:nuNxhwjNbNUCv6mbSdC2arVzgtzO5H0bXL0uNtTirdEd:nuNv9C6COJIMEH0MaTEdI

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks