General

  • Target

    1385eaed88424279c39847083aa132bd4192c86a7fec673681fbc1e9675bdc9c

  • Size

    3.1MB

  • Sample

    240524-xlsmbsfd61

  • MD5

    4e2eca96bd7f62ff40a2a7bf28eea5a0

  • SHA1

    30d149e7a9be2bcaa63983ce11268c4c87801ef7

  • SHA256

    1385eaed88424279c39847083aa132bd4192c86a7fec673681fbc1e9675bdc9c

  • SHA512

    04baaf8b4b0aea4c37e55c3c6e23f56729fe409bb1ad5c9f9efc135a052c08abd0b39649802c07cee41e2c60ed56dfa1efa92d1405f274ab7ecf7ddc06f282f2

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBRB/bSqz8b6LNXJqI:sxX7QnxrloE5dpUp2bVz8eLFc

Malware Config

Targets

    • Target

      1385eaed88424279c39847083aa132bd4192c86a7fec673681fbc1e9675bdc9c

    • Size

      3.1MB

    • MD5

      4e2eca96bd7f62ff40a2a7bf28eea5a0

    • SHA1

      30d149e7a9be2bcaa63983ce11268c4c87801ef7

    • SHA256

      1385eaed88424279c39847083aa132bd4192c86a7fec673681fbc1e9675bdc9c

    • SHA512

      04baaf8b4b0aea4c37e55c3c6e23f56729fe409bb1ad5c9f9efc135a052c08abd0b39649802c07cee41e2c60ed56dfa1efa92d1405f274ab7ecf7ddc06f282f2

    • SSDEEP

      49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBRB/bSqz8b6LNXJqI:sxX7QnxrloE5dpUp2bVz8eLFc

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks