General

  • Target

    a1485738ccce46109a244e1ebade24d4eeef05a13f807b0e9a3a93987b7f33c0

  • Size

    16KB

  • Sample

    240523-fze5qafa35

  • MD5

    fe1f103567576c18c10c39ca03fb3139

  • SHA1

    a4d81e6867d0dd836b785babaadddc871b40962c

  • SHA256

    a1485738ccce46109a244e1ebade24d4eeef05a13f807b0e9a3a93987b7f33c0

  • SHA512

    80dd099db6b1c960eb4c40ace895a9a13d617e69ddc65653bbff87b13b5d638c664c12d6e83f80d0f2239061a0b958f2b5f50064edfe93e62cb7a072c6eaf430

  • SSDEEP

    192:nx+uPBkqyIfgm64++u6gzYMzZ0dqsEq65+O0I5L0pJ/WDvd0EtITbKH62RTs2/fd:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/l

Malware Config

Targets

    • Target

      a1485738ccce46109a244e1ebade24d4eeef05a13f807b0e9a3a93987b7f33c0

    • Size

      16KB

    • MD5

      fe1f103567576c18c10c39ca03fb3139

    • SHA1

      a4d81e6867d0dd836b785babaadddc871b40962c

    • SHA256

      a1485738ccce46109a244e1ebade24d4eeef05a13f807b0e9a3a93987b7f33c0

    • SHA512

      80dd099db6b1c960eb4c40ace895a9a13d617e69ddc65653bbff87b13b5d638c664c12d6e83f80d0f2239061a0b958f2b5f50064edfe93e62cb7a072c6eaf430

    • SSDEEP

      192:nx+uPBkqyIfgm64++u6gzYMzZ0dqsEq65+O0I5L0pJ/WDvd0EtITbKH62RTs2/fd:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/l

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks