General

  • Target

    https://www.bing.com/ck/a?!&&p=dcdee2dbfb8dc270JmltdHM9MTcxMDgwNjQwMCZpZ3VpZD0yODBkZjRhNy03MzcyLTZmYmItM2YyYS1lNzY4NzIxMTZlZGYmaW5zaWQ9NTUzNQ&ptn=3&ver=2&hsh=3&fclid=280df4a7-7372-6fbb-3f2a-e76872116edf&psq=Europ%c3%a4ischer+Unfallbericht&u=a1aHR0cHM6Ly93d3cuY2hpcC5kZS9kb3dubG9hZHMvVW5mYWxsYmVyaWNodC1Wb3JsYWdlLVBERl8xNDU4NjgwOC5odG1s&ntb=1

  • Sample

    240319-pfj41abg97

Malware Config

Targets

    • Target

      https://www.bing.com/ck/a?!&&p=dcdee2dbfb8dc270JmltdHM9MTcxMDgwNjQwMCZpZ3VpZD0yODBkZjRhNy03MzcyLTZmYmItM2YyYS1lNzY4NzIxMTZlZGYmaW5zaWQ9NTUzNQ&ptn=3&ver=2&hsh=3&fclid=280df4a7-7372-6fbb-3f2a-e76872116edf&psq=Europ%c3%a4ischer+Unfallbericht&u=a1aHR0cHM6Ly93d3cuY2hpcC5kZS9kb3dubG9hZHMvVW5mYWxsYmVyaWNodC1Wb3JsYWdlLVBERl8xNDU4NjgwOC5odG1s&ntb=1

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks