General

  • Target

    sample

  • Size

    735KB

  • Sample

    230206-vysrrafa77

  • MD5

    38bdfb6524cd50986edfd56767b0cbb7

  • SHA1

    52ce42056d55ec46f9172bc06a6c9970eccc8205

  • SHA256

    108362642bb9fac45815b85a7020421d95f7c14496b502ebca0d39014be5dd01

  • SHA512

    7ee8c541bacfb5857b80afbb9c559b9eeb02745f90d22d3a58bc8ce17fcdcfecf83a85c6d4a0ee9a8ae314b8d3a66c7d64791d66d0b597384495c87047bf4876

  • SSDEEP

    6144:XCMMxjMxbMx0MxHMxrMxmMxlMxxghm92KGh3xGGjPQUaUmsnIzwOyw2hWTkDMb7V:X9MhM1MSMNMxM4MHMXQ0b2g

Malware Config

Targets

    • Target

      sample

    • Size

      735KB

    • MD5

      38bdfb6524cd50986edfd56767b0cbb7

    • SHA1

      52ce42056d55ec46f9172bc06a6c9970eccc8205

    • SHA256

      108362642bb9fac45815b85a7020421d95f7c14496b502ebca0d39014be5dd01

    • SHA512

      7ee8c541bacfb5857b80afbb9c559b9eeb02745f90d22d3a58bc8ce17fcdcfecf83a85c6d4a0ee9a8ae314b8d3a66c7d64791d66d0b597384495c87047bf4876

    • SSDEEP

      6144:XCMMxjMxbMx0MxHMxrMxmMxlMxxghm92KGh3xGGjPQUaUmsnIzwOyw2hWTkDMb7V:X9MhM1MSMNMxM4MHMXQ0b2g

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

File Permissions Modification

1
T1222

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

5
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

5
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

1
T1005

Tasks