Resubmissions

16/07/2024, 01:46

240716-b7glassckh 1

16/07/2024, 01:43

240716-b5nltssbpe 7

General

  • Target

    BraveBrowserSetup-BRV002.exe

  • Size

    1.2MB

  • Sample

    240716-b5nltssbpe

  • MD5

    f53f9124eb5efa98fbc32cb489f5459b

  • SHA1

    8a6095a94b9b80abecaad7fdd7c461bd6edd837d

  • SHA256

    ea45663eb7a87ae2f908c9760c1ac6b91e702b3f19072e94ea532da7b10cc76a

  • SHA512

    1113ae528de0c033b977780f09d940aac9f25d07144f07d13e8a3d6927af2c3d3f11ca3d8075de5e49dd0a3eefe7fe8edaaf0f4be1f125f8c0f0f9987019c1bd

  • SSDEEP

    24576:v/dr/0my7XpuYa9IvVD3YJsCmPj4RlTlPGTaFSFk1pjRjO+:9r/yxaSZ50Rlh+TaJpjxz

Malware Config

Targets

    • Target

      BraveBrowserSetup-BRV002.exe

    • Size

      1.2MB

    • MD5

      f53f9124eb5efa98fbc32cb489f5459b

    • SHA1

      8a6095a94b9b80abecaad7fdd7c461bd6edd837d

    • SHA256

      ea45663eb7a87ae2f908c9760c1ac6b91e702b3f19072e94ea532da7b10cc76a

    • SHA512

      1113ae528de0c033b977780f09d940aac9f25d07144f07d13e8a3d6927af2c3d3f11ca3d8075de5e49dd0a3eefe7fe8edaaf0f4be1f125f8c0f0f9987019c1bd

    • SSDEEP

      24576:v/dr/0my7XpuYa9IvVD3YJsCmPj4RlTlPGTaFSFk1pjRjO+:9r/yxaSZ50Rlh+TaJpjxz

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks