General

  • Target

    3885947f92e29efda5b99462e34730a916d302802bb74916651d4b41753d621f.zip

  • Size

    2.2MB

  • Sample

    230306-nqplssbd8w

  • MD5

    f33684f7e00199a8864b65776a5df500

  • SHA1

    ff53955371c6e36bf69988befafbefefa9e0cb37

  • SHA256

    db5d969ed82a8f31442e9e80fbe8f3bb931b9aea5d130a7347b1e7fd3aabb1dd

  • SHA512

    f868f49b8371e7c9d59e67b8323513abe93a3b2c1510c5f9636e9c01933d32d040056a6a15467c5122ddb25b4b8211e1878210b2aaf4251d18807e997f02bfa0

  • SSDEEP

    49152:1w6bd8HQCMQfecMYBIjwuPKIX3nMI/vMunZmWJUNoqthBNCLv+:172QLQ27YBIjpCPUv7nQJthBNE+

Malware Config

Targets

    • Target

      3885947f92e29efda5b99462e34730a916d302802bb74916651d4b41753d621f

    • Size

      2.2MB

    • MD5

      04ff9ea0b63fd3626e382d21aca0e443

    • SHA1

      7a28e3a62ee8e8d613d4adacc237c6f03f5ca6c4

    • SHA256

      3885947f92e29efda5b99462e34730a916d302802bb74916651d4b41753d621f

    • SHA512

      d1b73cfb58fc893a990e18df039ec930654bccdd8fbbc8fb9efc99fb913a25a3fe9751adc864f94fb954f940d742defa00fe9201ee35fd5097a38e80f5b65658

    • SSDEEP

      49152:bf4JYjtvbdDUDYTSN4x1PjcvJ5dfSObPXAbVoE56ijSb:UI5wDYy4f7wdLbQVoEc7b

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks