General

  • Target

    222.PNG

  • Size

    14KB

  • Sample

    240428-f6355ahc5x

  • MD5

    c36030f06fa84397f574f38a910b769d

  • SHA1

    64fe84993f76a302c586cd7988aee08b039a79dd

  • SHA256

    04d2a0e91a3076610fe9ee05a8cff140e0ae6ee9e7ea856e29249ae1e751eaa5

  • SHA512

    3359caef7c22da2d987d7b6573ec568ad7e56742f1dce90d99f8b9a312ac651e7fe261fc83d99ac8d3b7e74b371a56e4ee1111983f78171a566aaf145b3ebf0a

  • SSDEEP

    384:Q3jquTVtiM5/i4Qfa4N/IAc9ciZNIfTKlwBOLXJw:OqCVtiL4kpIAQcwIfOlwWw

Malware Config

Targets

    • Target

      222.PNG

    • Size

      14KB

    • MD5

      c36030f06fa84397f574f38a910b769d

    • SHA1

      64fe84993f76a302c586cd7988aee08b039a79dd

    • SHA256

      04d2a0e91a3076610fe9ee05a8cff140e0ae6ee9e7ea856e29249ae1e751eaa5

    • SHA512

      3359caef7c22da2d987d7b6573ec568ad7e56742f1dce90d99f8b9a312ac651e7fe261fc83d99ac8d3b7e74b371a56e4ee1111983f78171a566aaf145b3ebf0a

    • SSDEEP

      384:Q3jquTVtiM5/i4Qfa4N/IAc9ciZNIfTKlwBOLXJw:OqCVtiL4kpIAQcwIfOlwWw

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

5
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks