General

  • Target

    wzsus53.exe

  • Size

    45.5MB

  • Sample

    240617-sehrbsvckc

  • MD5

    9deff019a43346d956d016cd91df342a

  • SHA1

    bc2646503a6e9a0c8a726bdf79a24fceb7e82455

  • SHA256

    fc3e420307b05488b75daf5a1e704018dbcf9ba45bd431eb83f06c937a67d505

  • SHA512

    b6122fc7779d8aafbffaca5bb07ee1142fcfcaf01e007f7aa9e003fb1d25c6b4573002551b5cc1c7a8ce1b2434c6a537d50a91eb91a09c798cff13e14a9230dc

  • SSDEEP

    786432:9VGm8MMKmA+hdUhdVINydDp+W+iAFaCVVsqxIEnABHqkBEzYiyFVx6OBT2oVU:9VGmzMxRhdIbIyQWeFa6VsqxIGAApyzK

Malware Config

Targets

    • Target

      wzsus53.exe

    • Size

      45.5MB

    • MD5

      9deff019a43346d956d016cd91df342a

    • SHA1

      bc2646503a6e9a0c8a726bdf79a24fceb7e82455

    • SHA256

      fc3e420307b05488b75daf5a1e704018dbcf9ba45bd431eb83f06c937a67d505

    • SHA512

      b6122fc7779d8aafbffaca5bb07ee1142fcfcaf01e007f7aa9e003fb1d25c6b4573002551b5cc1c7a8ce1b2434c6a537d50a91eb91a09c798cff13e14a9230dc

    • SSDEEP

      786432:9VGm8MMKmA+hdUhdVINydDp+W+iAFaCVVsqxIEnABHqkBEzYiyFVx6OBT2oVU:9VGmzMxRhdIbIyQWeFa6VsqxIGAApyzK

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks