General

  • Target

    2969d3646fd6bba6f94b3939c057a5a7b4443f94917b174df5644b7d90d195b5

  • Size

    4.6MB

  • Sample

    240428-yb9njafd32

  • MD5

    5fb1d0fda1c40147101568c8238d144e

  • SHA1

    5f677741141cf0ce038e10b5651117b911963278

  • SHA256

    2969d3646fd6bba6f94b3939c057a5a7b4443f94917b174df5644b7d90d195b5

  • SHA512

    d48089dd5e2d0890d14baec04e1bbadb789ba412729ef387864d216871d659b96099a3615a7fea86e889e1fec90b782c4bb5e6473a82c73b40d686221fc553d7

  • SSDEEP

    98304:G4+PG8W44ij9RvbGOZUR241QZgC51B+PRPuCCMlwLv:uPG8W4HhbVURp11CjgJu6

Malware Config

Targets

    • Target

      2969d3646fd6bba6f94b3939c057a5a7b4443f94917b174df5644b7d90d195b5

    • Size

      4.6MB

    • MD5

      5fb1d0fda1c40147101568c8238d144e

    • SHA1

      5f677741141cf0ce038e10b5651117b911963278

    • SHA256

      2969d3646fd6bba6f94b3939c057a5a7b4443f94917b174df5644b7d90d195b5

    • SHA512

      d48089dd5e2d0890d14baec04e1bbadb789ba412729ef387864d216871d659b96099a3615a7fea86e889e1fec90b782c4bb5e6473a82c73b40d686221fc553d7

    • SSDEEP

      98304:G4+PG8W44ij9RvbGOZUR241QZgC51B+PRPuCCMlwLv:uPG8W4HhbVURp11CjgJu6

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

5
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Tasks