General

  • Target

    16d84ca07bfc6000ce65cddff6c3bae938fd3b1de4b80a49970227ab79204ed7

  • Size

    17KB

  • Sample

    240611-w7behaxamm

  • MD5

    fa2812aed3986602e083398d9dce6e53

  • SHA1

    5e2dc094c11442df58a88884ee0a2b5fee02f4c9

  • SHA256

    16d84ca07bfc6000ce65cddff6c3bae938fd3b1de4b80a49970227ab79204ed7

  • SHA512

    a13c40b807658359910e009f993202f9cdd1a32e5e8332b7a313b2708c8c6e2653bbe261084c47cee718b8d3ae599307991accfcb9e64bf095e11a11f9c701d0

  • SSDEEP

    384:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/SG:IMAQ+BzWPEwnE+KHM2/SG

Malware Config

Targets

    • Target

      16d84ca07bfc6000ce65cddff6c3bae938fd3b1de4b80a49970227ab79204ed7

    • Size

      17KB

    • MD5

      fa2812aed3986602e083398d9dce6e53

    • SHA1

      5e2dc094c11442df58a88884ee0a2b5fee02f4c9

    • SHA256

      16d84ca07bfc6000ce65cddff6c3bae938fd3b1de4b80a49970227ab79204ed7

    • SHA512

      a13c40b807658359910e009f993202f9cdd1a32e5e8332b7a313b2708c8c6e2653bbe261084c47cee718b8d3ae599307991accfcb9e64bf095e11a11f9c701d0

    • SSDEEP

      384:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/SG:IMAQ+BzWPEwnE+KHM2/SG

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks