General

  • Target

    d083c8a59a063cfc81ccebd52a34cb56

  • Size

    332KB

  • Sample

    240317-ldxqjabg3w

  • MD5

    d083c8a59a063cfc81ccebd52a34cb56

  • SHA1

    3b41d61e102ec45facc397cfe4cf2ecdf452007a

  • SHA256

    24633ce7166264c99ebc5595494c44f6de5506091b8fa5e648f23245f6094268

  • SHA512

    83bdb733bc82ceb04fffb34771efc759c9965fc8decfcddbedb22f275554dde492741ab5e2e64b44b702f0da07dc35e15f79086c46283c4838b4ee20cdd038f5

  • SSDEEP

    6144:zdbdCyflEM/cmF2fRboh8d+oBJ16J+8IbTFyoVjHtyqhU:zeyflncmqJo8U+8wy8

Malware Config

Targets

    • Target

      d083c8a59a063cfc81ccebd52a34cb56

    • Size

      332KB

    • MD5

      d083c8a59a063cfc81ccebd52a34cb56

    • SHA1

      3b41d61e102ec45facc397cfe4cf2ecdf452007a

    • SHA256

      24633ce7166264c99ebc5595494c44f6de5506091b8fa5e648f23245f6094268

    • SHA512

      83bdb733bc82ceb04fffb34771efc759c9965fc8decfcddbedb22f275554dde492741ab5e2e64b44b702f0da07dc35e15f79086c46283c4838b4ee20cdd038f5

    • SSDEEP

      6144:zdbdCyflEM/cmF2fRboh8d+oBJ16J+8IbTFyoVjHtyqhU:zeyflncmqJo8U+8wy8

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks