General

  • Target

    36fb695ec0b3e86da0d98d913b7d62974b449c4a9e060005170c6371ff3b79ec

  • Size

    3.9MB

  • Sample

    240524-zasjasaa8x

  • MD5

    23e90af209709ce8901a4dd3433cf4b3

  • SHA1

    6d59513c6a2601214cfe5dc0c144d52486b087c7

  • SHA256

    36fb695ec0b3e86da0d98d913b7d62974b449c4a9e060005170c6371ff3b79ec

  • SHA512

    9582c5e5ff76f17431dcb5e672b97fb1e661c6d10172a12cb88647253411e2ab3a974704b5e8977efabe9d1ad6f358095a4c9d5c4273874f27b77bcbff52e558

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBQB/bSqz8:sxX7QnxrloE5dpUpPbVz8

Malware Config

Targets

    • Target

      36fb695ec0b3e86da0d98d913b7d62974b449c4a9e060005170c6371ff3b79ec

    • Size

      3.9MB

    • MD5

      23e90af209709ce8901a4dd3433cf4b3

    • SHA1

      6d59513c6a2601214cfe5dc0c144d52486b087c7

    • SHA256

      36fb695ec0b3e86da0d98d913b7d62974b449c4a9e060005170c6371ff3b79ec

    • SHA512

      9582c5e5ff76f17431dcb5e672b97fb1e661c6d10172a12cb88647253411e2ab3a974704b5e8977efabe9d1ad6f358095a4c9d5c4273874f27b77bcbff52e558

    • SSDEEP

      49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBQB/bSqz8:sxX7QnxrloE5dpUpPbVz8

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks