General

  • Target

    2024-04-28_e3e53d015bf224904f16f6602f87ca70_magniber

  • Size

    8.8MB

  • Sample

    240428-fhxy7sge56

  • MD5

    e3e53d015bf224904f16f6602f87ca70

  • SHA1

    83bc53c80d6c43611f0b3a16863da8e22de78b5b

  • SHA256

    a34b0567360467e86bf591c8a241bea2299bddb09dfc9e1b18f0f2ed1402ed40

  • SHA512

    c92dae60317625d39dc8b0502339fe612e11bb2ea9af7d8ff65d11850e1b5a30d4850597f0a2ef1b82008b919cc5f8ba8869f651554177e67f4951274201b6e8

  • SSDEEP

    98304:qmCMLyAw3LNIsVqygGP0w1sBJ1QttoFCqkKq7NO55f0pmsOWrqufezvWq/vUv2Tz:WJBILX6svTCZWfFWrqufezvWqHUg

Malware Config

Targets

    • Target

      2024-04-28_e3e53d015bf224904f16f6602f87ca70_magniber

    • Size

      8.8MB

    • MD5

      e3e53d015bf224904f16f6602f87ca70

    • SHA1

      83bc53c80d6c43611f0b3a16863da8e22de78b5b

    • SHA256

      a34b0567360467e86bf591c8a241bea2299bddb09dfc9e1b18f0f2ed1402ed40

    • SHA512

      c92dae60317625d39dc8b0502339fe612e11bb2ea9af7d8ff65d11850e1b5a30d4850597f0a2ef1b82008b919cc5f8ba8869f651554177e67f4951274201b6e8

    • SSDEEP

      98304:qmCMLyAw3LNIsVqygGP0w1sBJ1QttoFCqkKq7NO55f0pmsOWrqufezvWq/vUv2Tz:WJBILX6svTCZWfFWrqufezvWqHUg

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks