General

  • Target

    b6d6666ca9f0e419b8258dde61646076d1fc1c9442542296c84196dbf6a7e83d

  • Size

    16KB

  • Sample

    240524-d7mtesbf51

  • MD5

    ce4e561c47dea3b2ff87dcc2d8dfbccf

  • SHA1

    fa317b3d227017415c73145ccea965315309f289

  • SHA256

    b6d6666ca9f0e419b8258dde61646076d1fc1c9442542296c84196dbf6a7e83d

  • SHA512

    83e14ca39042dc7ce7ae08d7dbdc889a35aa1e81c1da9b2bc931e8e57063c2a2242768d29e575e042771498ad5f443b6c7275c124c450a8c8daac4dc11bf5404

  • SSDEEP

    384:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/qL:IMAQ+BzWPEwnE+KHM2/m

Malware Config

Targets

    • Target

      b6d6666ca9f0e419b8258dde61646076d1fc1c9442542296c84196dbf6a7e83d

    • Size

      16KB

    • MD5

      ce4e561c47dea3b2ff87dcc2d8dfbccf

    • SHA1

      fa317b3d227017415c73145ccea965315309f289

    • SHA256

      b6d6666ca9f0e419b8258dde61646076d1fc1c9442542296c84196dbf6a7e83d

    • SHA512

      83e14ca39042dc7ce7ae08d7dbdc889a35aa1e81c1da9b2bc931e8e57063c2a2242768d29e575e042771498ad5f443b6c7275c124c450a8c8daac4dc11bf5404

    • SSDEEP

      384:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/qL:IMAQ+BzWPEwnE+KHM2/m

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks