General

  • Target

    36d68d28ae786975674d8ee8fbf67a8c383d52f100df3fcaa16dec2aef88aa73

  • Size

    1.3MB

  • Sample

    240618-nsjtbs1hrg

  • MD5

    9fa20af5ee7e0440c334587c3ccde6c8

  • SHA1

    e8d18361d8eb7d1c66166bb0ba1d12bd72e206d6

  • SHA256

    36d68d28ae786975674d8ee8fbf67a8c383d52f100df3fcaa16dec2aef88aa73

  • SHA512

    d3299fdc9242e974955e5d42fe0a91fda3b10140c3c805017ca9ba138d96a9b7252e691a0fe3184c46bc6d6205f03d17bee92b220a986bf3c16bbad9aa57b55f

  • SSDEEP

    24576:/sGoPM9jkPd17jwfYl7jy0hslMQwKQnjr51uTiZxv879kENIdLwN4ZASFD:OM9QPdxwfE7WlFwKAfzuTiDFUFk

Malware Config

Targets

    • Target

      36d68d28ae786975674d8ee8fbf67a8c383d52f100df3fcaa16dec2aef88aa73

    • Size

      1.3MB

    • MD5

      9fa20af5ee7e0440c334587c3ccde6c8

    • SHA1

      e8d18361d8eb7d1c66166bb0ba1d12bd72e206d6

    • SHA256

      36d68d28ae786975674d8ee8fbf67a8c383d52f100df3fcaa16dec2aef88aa73

    • SHA512

      d3299fdc9242e974955e5d42fe0a91fda3b10140c3c805017ca9ba138d96a9b7252e691a0fe3184c46bc6d6205f03d17bee92b220a986bf3c16bbad9aa57b55f

    • SSDEEP

      24576:/sGoPM9jkPd17jwfYl7jy0hslMQwKQnjr51uTiZxv879kENIdLwN4ZASFD:OM9QPdxwfE7WlFwKAfzuTiDFUFk

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Active Setup

1
T1547.014

Event Triggered Execution

2
T1546

Image File Execution Options Injection

1
T1546.012

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Active Setup

1
T1547.014

Event Triggered Execution

2
T1546

Image File Execution Options Injection

1
T1546.012

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks