General

  • Target

    l4auun4err0-501.exe

  • Size

    575KB

  • Sample

    240601-1xqtnagb2z

  • MD5

    1b7dae17fc6412f908456d83f2d6a050

  • SHA1

    aeafa3c4d6cd5f0e490351337b083ca3764b6a65

  • SHA256

    d335c13449f215a80fb3adcdb0003bda1e607669b133787ee479073adcb2ddc9

  • SHA512

    df8ffb2e8a6291306051b04282cad4d337bc8568c820a559764d5f392f1b45d6f055006d440695578e3dbaf2ed15d02a614a7251c349ba7306c60c629e94cc38

  • SSDEEP

    12288:aXzMpLiRDA/Sz9X9G4xN5lgy1Pz87Grypd+NEbFLbEc5Zjf3sGdGLR00C1EO:aXopi+qRkYNUyZVypAN0hbB1f3sGdwCt

Malware Config

Targets

    • Target

      l4auun4err0-501.exe

    • Size

      575KB

    • MD5

      1b7dae17fc6412f908456d83f2d6a050

    • SHA1

      aeafa3c4d6cd5f0e490351337b083ca3764b6a65

    • SHA256

      d335c13449f215a80fb3adcdb0003bda1e607669b133787ee479073adcb2ddc9

    • SHA512

      df8ffb2e8a6291306051b04282cad4d337bc8568c820a559764d5f392f1b45d6f055006d440695578e3dbaf2ed15d02a614a7251c349ba7306c60c629e94cc38

    • SSDEEP

      12288:aXzMpLiRDA/Sz9X9G4xN5lgy1Pz87Grypd+NEbFLbEc5Zjf3sGdGLR00C1EO:aXopi+qRkYNUyZVypAN0hbB1f3sGdwCt

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks