General

  • Target

    0cc0aa5877cec9109b7a5a0e3a250c72.bin

  • Size

    513KB

  • Sample

    230412-bk51dagf28

  • MD5

    0cc0aa5877cec9109b7a5a0e3a250c72

  • SHA1

    1d49d462a11a00d8ac9608e49f055961bf79980d

  • SHA256

    1324acd1f720055e7941b39949116dfe72ce2e7792e70128f69e228eb48b0821

  • SHA512

    642b0d06755c78658c308167cf9e61a0e42bb792c61306c6f6976c5ebc51cbce1f795b534e4767e8106edc68bd58f16943c7acc0846cf1c67161c67c28746637

  • SSDEEP

    12288:B/P+NYgHizBSWMJ/17sM57k0+iQkB86PGjg:BO6gH8UJ/mMWkBCg

Malware Config

Targets

    • Target

      0cc0aa5877cec9109b7a5a0e3a250c72.bin

    • Size

      513KB

    • MD5

      0cc0aa5877cec9109b7a5a0e3a250c72

    • SHA1

      1d49d462a11a00d8ac9608e49f055961bf79980d

    • SHA256

      1324acd1f720055e7941b39949116dfe72ce2e7792e70128f69e228eb48b0821

    • SHA512

      642b0d06755c78658c308167cf9e61a0e42bb792c61306c6f6976c5ebc51cbce1f795b534e4767e8106edc68bd58f16943c7acc0846cf1c67161c67c28746637

    • SSDEEP

      12288:B/P+NYgHizBSWMJ/17sM57k0+iQkB86PGjg:BO6gH8UJ/mMWkBCg

    • GoldDragon

      GoldDragon is a second-stage backdoor attributed to Kimsuky.

    • GoldDragon 2021 Stage1 backdoor

      Detect GoldDragon backdoor Stage 1.

    • GoldDragon 2021 Stage2 infostealer

      Detect GoldDragon InfoStealer Stage 2.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.