General

  • Target

    ChromeSetup.exe

  • Size

    8.5MB

  • Sample

    240808-bnnv9sxekj

  • MD5

    46324246db3e13ffe75408989b904fae

  • SHA1

    1c52e8004cdbe49d61c58afbf20f76eab1905b26

  • SHA256

    2ad8bf3c4fdc4577e6ec6289fc2d4aa5eae9c9eba189c45803baf319ca2b2d9a

  • SHA512

    11bdb36cf8053b9f399ac91caf0fa08b97a4f8d1fe629a057dd3caad969e5eeb542955db1ec2a4a36c0252a73bb5f1920a289750acd3d3c01a346c049dbaaf72

  • SSDEEP

    196608:6xfKlmR5/9Bz6nKuvueLWj9HC/Zfy5hPza21BNmxIVFuvgW8B:6bR57WnKYueL88ZK5Za21BNmxQFuvg

Malware Config

Targets

    • Target

      ChromeSetup.exe

    • Size

      8.5MB

    • MD5

      46324246db3e13ffe75408989b904fae

    • SHA1

      1c52e8004cdbe49d61c58afbf20f76eab1905b26

    • SHA256

      2ad8bf3c4fdc4577e6ec6289fc2d4aa5eae9c9eba189c45803baf319ca2b2d9a

    • SHA512

      11bdb36cf8053b9f399ac91caf0fa08b97a4f8d1fe629a057dd3caad969e5eeb542955db1ec2a4a36c0252a73bb5f1920a289750acd3d3c01a346c049dbaaf72

    • SSDEEP

      196608:6xfKlmR5/9Bz6nKuvueLWj9HC/Zfy5hPza21BNmxIVFuvgW8B:6bR57WnKYueL88ZK5Za21BNmxQFuvg

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks