General

  • Target

    fff5c6d5c8175b2fc89d94d7e1d54b02683b43b200f3109767e7466f23e7c795

  • Size

    4.0MB

  • Sample

    240523-fypb1aeh8w

  • MD5

    f235e6f64f72a04fc3e66c43d97ad9ee

  • SHA1

    3b6753a3535a40616ef2bfb93c361dee53c78abb

  • SHA256

    fff5c6d5c8175b2fc89d94d7e1d54b02683b43b200f3109767e7466f23e7c795

  • SHA512

    3da2a300802b7c72bdda95d11d446dd633d6e2441f2c0368cb24e034d890acdd007c0fa6181f8d5e837c6bcc1336888206a3013c882b581d5f22e8017dd78298

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB6B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpxbVz8eLFcz

Malware Config

Targets

    • Target

      fff5c6d5c8175b2fc89d94d7e1d54b02683b43b200f3109767e7466f23e7c795

    • Size

      4.0MB

    • MD5

      f235e6f64f72a04fc3e66c43d97ad9ee

    • SHA1

      3b6753a3535a40616ef2bfb93c361dee53c78abb

    • SHA256

      fff5c6d5c8175b2fc89d94d7e1d54b02683b43b200f3109767e7466f23e7c795

    • SHA512

      3da2a300802b7c72bdda95d11d446dd633d6e2441f2c0368cb24e034d890acdd007c0fa6181f8d5e837c6bcc1336888206a3013c882b581d5f22e8017dd78298

    • SSDEEP

      49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB6B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpxbVz8eLFcz

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks