General

  • Target

    https://www.bing.com/aclick?ld=e8-PvRn5VX2HDSb6PfhzknlTVUCUyWoU20zWrvwK205CVmGB3vaWBCh5qcyXw4iGiZi_e8ueOhRTGlHXTQDItTAkap8rMvdYg4ZZY-rd4JkXo6pabw4VI8H4SqdIrY5vKvMqhBfV3O41P4IGgp9uKspl9G7PaaAnj3flkb9rZ9bH62_bMm&u=aHR0cHMlM2ElMmYlMmZ3d3cuYW1hem9uLmNvbSUyZnMlMmYlM2ZpZSUzZFVURjglMjZrZXl3b3JkcyUzZGdyZWVrJTJieW9ndXJ0JTJibWFraW5nJTI2aW5kZXglM2RhcHMlMjZ0YWclM2RtaDBiLTIwJTI2cmVmJTNkcGRfc2xfOXJyNDNjdmYxY19lJTI2YWRncnBpZCUzZDEzNDY5MDIzMDc0MzEzOTElMjZodmFkaWQlM2Q4NDE4MTczNzUzNTQ0MSUyNmh2bmV0dyUzZG8lMjZodnFtdCUzZGUlMjZodmJtdCUzZGJlJTI2aHZkZXYlM2RjJTI2aHZsb2NpbnQlM2QlMjZodmxvY3BoeSUzZDgyMTE0JTI2aHZ0YXJnaWQlM2Rrd2QtODQxODE3MzUwNTcyNzclM2Fsb2MtMTkwJTI2aHlkYWRjciUzZDIwMjQ0XzEzNDA1NjUy&rlid=0a8d48d39bc410acb3d82d08d52c2926

  • Sample

    240225-rt8qmaef3y

Malware Config

Targets

    • Target

      https://www.bing.com/aclick?ld=e8-PvRn5VX2HDSb6PfhzknlTVUCUyWoU20zWrvwK205CVmGB3vaWBCh5qcyXw4iGiZi_e8ueOhRTGlHXTQDItTAkap8rMvdYg4ZZY-rd4JkXo6pabw4VI8H4SqdIrY5vKvMqhBfV3O41P4IGgp9uKspl9G7PaaAnj3flkb9rZ9bH62_bMm&u=aHR0cHMlM2ElMmYlMmZ3d3cuYW1hem9uLmNvbSUyZnMlMmYlM2ZpZSUzZFVURjglMjZrZXl3b3JkcyUzZGdyZWVrJTJieW9ndXJ0JTJibWFraW5nJTI2aW5kZXglM2RhcHMlMjZ0YWclM2RtaDBiLTIwJTI2cmVmJTNkcGRfc2xfOXJyNDNjdmYxY19lJTI2YWRncnBpZCUzZDEzNDY5MDIzMDc0MzEzOTElMjZodmFkaWQlM2Q4NDE4MTczNzUzNTQ0MSUyNmh2bmV0dyUzZG8lMjZodnFtdCUzZGUlMjZodmJtdCUzZGJlJTI2aHZkZXYlM2RjJTI2aHZsb2NpbnQlM2QlMjZodmxvY3BoeSUzZDgyMTE0JTI2aHZ0YXJnaWQlM2Rrd2QtODQxODE3MzUwNTcyNzclM2Fsb2MtMTkwJTI2aHlkYWRjciUzZDIwMjQ0XzEzNDA1NjUy&rlid=0a8d48d39bc410acb3d82d08d52c2926

    • Changes its process name

    • Reads user data of web browsers

      Reads stored browser data which can include saved credentials.

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Reads CPU attributes

MITRE ATT&CK Enterprise v15

Tasks