General

  • Target

    file.exe

  • Size

    3.5MB

  • Sample

    230209-lg3qysee35

  • MD5

    5d69e6efaab3c2ad8136038108de1a4f

  • SHA1

    22d1bea7ae38e09b45b0090df91e0f1fec0559ba

  • SHA256

    863907db2703e6650d2e9341ab975e67f889cbb4f8efba089cf421295bb100d1

  • SHA512

    cdec194a1028903db806fad4471374a9a01dffcba938e7b7253caf9e671e3feb63b2f35d75d2d1582592bad007efdc5f3f03d42c17c528d46105ea26e539f542

  • SSDEEP

    98304:AqNHddSy2xT3SJ0vsw4AHCJpV/82TJNK+gT9/69CzFh7P7CbM5zD6sILTjblMS0u:rjV/pNK+gMwzbi4osI3jhMSN

Malware Config

Targets

    • Target

      file.exe

    • Size

      3.5MB

    • MD5

      5d69e6efaab3c2ad8136038108de1a4f

    • SHA1

      22d1bea7ae38e09b45b0090df91e0f1fec0559ba

    • SHA256

      863907db2703e6650d2e9341ab975e67f889cbb4f8efba089cf421295bb100d1

    • SHA512

      cdec194a1028903db806fad4471374a9a01dffcba938e7b7253caf9e671e3feb63b2f35d75d2d1582592bad007efdc5f3f03d42c17c528d46105ea26e539f542

    • SSDEEP

      98304:AqNHddSy2xT3SJ0vsw4AHCJpV/82TJNK+gT9/69CzFh7P7CbM5zD6sILTjblMS0u:rjV/pNK+gMwzbi4osI3jhMSN

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks