General

  • Target

    ChromeSetup.exe

  • Size

    1.4MB

  • Sample

    230331-z749csde69

  • MD5

    f9ba51ccaaf74e07e489dd16bf7e37b7

  • SHA1

    9de95c4daf6933002374bc05166af9c95a8784c5

  • SHA256

    530c4136e61c9e4600c0c7a41f3ceccfcd75e7a8ebddd50bc1d006f76e8c7266

  • SHA512

    ee69a2cde1fe6515d19de62022818836a2cecdaf98c87c5bd8670f8bf8b6819f15d2f0b7d686619e8dfc67afda54eef590cdba4600f31eabe7f9213ca2672e3c

  • SSDEEP

    24576:Jw8KjKjGFygcc23L1/NVOmOSGb6E3ecS4fzrjxJh9UZXlpbPvC7xtYUrEmFlo+LT:PKjKWQc2b1FVgbjrjxPe1pbPSQm1FloS

Malware Config

Targets

    • Target

      ChromeSetup.exe

    • Size

      1.4MB

    • MD5

      f9ba51ccaaf74e07e489dd16bf7e37b7

    • SHA1

      9de95c4daf6933002374bc05166af9c95a8784c5

    • SHA256

      530c4136e61c9e4600c0c7a41f3ceccfcd75e7a8ebddd50bc1d006f76e8c7266

    • SHA512

      ee69a2cde1fe6515d19de62022818836a2cecdaf98c87c5bd8670f8bf8b6819f15d2f0b7d686619e8dfc67afda54eef590cdba4600f31eabe7f9213ca2672e3c

    • SSDEEP

      24576:Jw8KjKjGFygcc23L1/NVOmOSGb6E3ecS4fzrjxJh9UZXlpbPvC7xtYUrEmFlo+LT:PKjKWQc2b1FVgbjrjxPe1pbPSQm1FloS

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

3
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks