General

  • Target

    NewFile1-2022-PaSs.rar

  • Size

    16.1MB

  • Sample

    230303-y6mr9abc74

  • MD5

    33b6ca7f0fad26452f52c6b5285b3e29

  • SHA1

    cd02db1ff77a536084ba3a1f15bc5ef0b43c9d26

  • SHA256

    3fca63d492c8977b5a4b54857b8664373ae069f38b9dfe2534084495de305009

  • SHA512

    e8234b8d05766eec0962423741e38c76b36d50def15b2203346e9a42720c3558314298309c6564d90cdbf67fc7b6a207a135a714420bd016a182f7cb8d7f533b

  • SSDEEP

    393216:OqFoB+tJEzlCD4RPipLSOYcPRLdXf/Twjewmfm09:DIAJWlnRPe+CpJTwg/

Malware Config

Targets

    • Target

      NewFile-Setup1-_2022_A_PasWrd.rar

    • Size

      16.1MB

    • MD5

      9da7f8688dc83e1612ba93380474964c

    • SHA1

      e724080d1ae289baf34cc82b47613e0ede8af138

    • SHA256

      8849dbb20fa6a5b05bddbf02f0ad1e0c305cb4c123b2c3f0bb0563cb12bc9708

    • SHA512

      f79e8a03a60541ba8879de959449a8d7f7489ce80fd0f18eca8ed946c3b5902073d9bec1279fca8a8b18847dbcdfe1f9a49c2df435b254b8dd65756242121b2c

    • SSDEEP

      393216:jqFoB+tJEzlCD4RPipLSOYcPRLdXf/Twjewmfm0J:GIAJWlnRPe+CpJTwgj

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks