General

  • Target

    2024-04-28_30663e3b8f0273b857dc2abcc9b0759b_magniber

  • Size

    8.8MB

  • Sample

    240428-e3lw1aga76

  • MD5

    30663e3b8f0273b857dc2abcc9b0759b

  • SHA1

    cd0230b966e9328129a7036e890cf48cfbf43471

  • SHA256

    254a4c221d382ae5e47f2134b403d225f0f2010494fbab24689c0c19dd16b3f5

  • SHA512

    e28e414670eaced37e9b4927467c7bda5f19c54789793c160e38e082ebb18f393b386cd44e4c63f47d26966948d6a81e0cdcc3c9443562cb0abb72fd932e572c

  • SSDEEP

    98304:bmCMLyAw3LNIsVqygGP0w1sBJ1QttoFCqkKq7NO55f0pmsOWrqufezvWq/vUv2Ty:VJBILX6svTCZWfFWrqufezvWqHU1

Malware Config

Targets

    • Target

      2024-04-28_30663e3b8f0273b857dc2abcc9b0759b_magniber

    • Size

      8.8MB

    • MD5

      30663e3b8f0273b857dc2abcc9b0759b

    • SHA1

      cd0230b966e9328129a7036e890cf48cfbf43471

    • SHA256

      254a4c221d382ae5e47f2134b403d225f0f2010494fbab24689c0c19dd16b3f5

    • SHA512

      e28e414670eaced37e9b4927467c7bda5f19c54789793c160e38e082ebb18f393b386cd44e4c63f47d26966948d6a81e0cdcc3c9443562cb0abb72fd932e572c

    • SSDEEP

      98304:bmCMLyAw3LNIsVqygGP0w1sBJ1QttoFCqkKq7NO55f0pmsOWrqufezvWq/vUv2Ty:VJBILX6svTCZWfFWrqufezvWqHU1

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks