General

  • Target

    insta.py

  • Size

    13KB

  • Sample

    240531-1phhbafe47

  • MD5

    5af81fe1ac07f329d3172ba43f33023d

  • SHA1

    bee90416f7b64cae293806b9fcf147c04fe9c604

  • SHA256

    862593976483f4284843d62f215c7182799c96ed1081e8c96774233d55142c57

  • SHA512

    154c7cf9f33ea351954574fb10f1facdbac9ade255044961e36f0f1c39b9c5255c9d1a5d2939c450ced595f60a04c9d9fc6ba3fb4a7a63eafbf2a2a7b8c90c03

  • SSDEEP

    384:s644444444Q44444444mOq244c44DE4xpVQaxNC:s644444444Q44444444mOq244c44DE4G

Malware Config

Targets

    • Target

      insta.py

    • Size

      13KB

    • MD5

      5af81fe1ac07f329d3172ba43f33023d

    • SHA1

      bee90416f7b64cae293806b9fcf147c04fe9c604

    • SHA256

      862593976483f4284843d62f215c7182799c96ed1081e8c96774233d55142c57

    • SHA512

      154c7cf9f33ea351954574fb10f1facdbac9ade255044961e36f0f1c39b9c5255c9d1a5d2939c450ced595f60a04c9d9fc6ba3fb4a7a63eafbf2a2a7b8c90c03

    • SSDEEP

      384:s644444444Q44444444mOq244c44DE4xpVQaxNC:s644444444Q44444444mOq244c44DE4G

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks