General

  • Target

    78c56c6fd7ed0ff5c69ec132d61e27b3.exe

  • Size

    414KB

  • Sample

    230619-nzlaqseg2y

  • MD5

    78c56c6fd7ed0ff5c69ec132d61e27b3

  • SHA1

    74a6d0f1b2439cff590d63922f4c3f442f39ab10

  • SHA256

    6fac7a1f4443bf70639465110324881bdf63d2bb86e1a4397dd72a25fa1364a8

  • SHA512

    82d351e3117215114c984d57c1b73b6c3955cf0f937a04bf107a9911b343660147dc58825103ba749e6f7cd8e54a4f8e8e3f4e61942f3cd952da7b7b604ed0ec

  • SSDEEP

    12288:vqugI2VOoo9QTB8gw2JL8xjiUinElye4HbFTt:Cr3Ooo618faCj3inzhTt

Malware Config

Targets

    • Target

      78c56c6fd7ed0ff5c69ec132d61e27b3.exe

    • Size

      414KB

    • MD5

      78c56c6fd7ed0ff5c69ec132d61e27b3

    • SHA1

      74a6d0f1b2439cff590d63922f4c3f442f39ab10

    • SHA256

      6fac7a1f4443bf70639465110324881bdf63d2bb86e1a4397dd72a25fa1364a8

    • SHA512

      82d351e3117215114c984d57c1b73b6c3955cf0f937a04bf107a9911b343660147dc58825103ba749e6f7cd8e54a4f8e8e3f4e61942f3cd952da7b7b604ed0ec

    • SSDEEP

      12288:vqugI2VOoo9QTB8gw2JL8xjiUinElye4HbFTt:Cr3Ooo618faCj3inzhTt

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks