General

  • Target

    tmp

  • Size

    3.1MB

  • Sample

    231011-psk7tshg82

  • MD5

    fdb8415567c0748a3bd4ffb9ac783cb7

  • SHA1

    dbc51b3b102a1fd0fffa2dd5d2809c6e385d6a82

  • SHA256

    92025c595d1a8e503aed2725ef9e64ef4ea919307c2694ffd564993ee4b64d43

  • SHA512

    4335ed11f768209edff90f4611b7ea9ec3ca40daa39eea98cd6cf62bf4a51e1d94d2aa3b3d42b51abb834d2954aaccf84006c6d2af3065b8f35f3b505f3674c2

  • SSDEEP

    98304:BE45G/DTclFuOqW6KGZKZhHRhZBiTdpU8:BE450QuO9xJZhHHic8

Malware Config

Targets

    • Target

      tmp

    • Size

      3.1MB

    • MD5

      fdb8415567c0748a3bd4ffb9ac783cb7

    • SHA1

      dbc51b3b102a1fd0fffa2dd5d2809c6e385d6a82

    • SHA256

      92025c595d1a8e503aed2725ef9e64ef4ea919307c2694ffd564993ee4b64d43

    • SHA512

      4335ed11f768209edff90f4611b7ea9ec3ca40daa39eea98cd6cf62bf4a51e1d94d2aa3b3d42b51abb834d2954aaccf84006c6d2af3065b8f35f3b505f3674c2

    • SSDEEP

      98304:BE45G/DTclFuOqW6KGZKZhHRhZBiTdpU8:BE450QuO9xJZhHHic8

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks