General

  • Target

    poisson.exe

  • Size

    107.1MB

  • Sample

    240808-t4qc5swdjq

  • MD5

    61c459021b9f18691dd574578e2f62b5

  • SHA1

    57ddfe62e58ca6a2fb899bc29e011c30870c6379

  • SHA256

    9342b721a094c6b8687b8a0b3f3e69109ec0135350435c80ae0676a277c3c77d

  • SHA512

    83c03c38c9b7875ff4d69d4f2704811f45b19f66b4ebf26c4ae1cf4191a69bb330d980a39a450541e4154020aa42a965905d4be92d9f3a55f86752179dcb9155

  • SSDEEP

    3145728:LgYRPSC++6y97iX5M3gbcKCVL2qHO5iDev279SY4:LxaC4y9uE2CVBHCiyv2p4

Malware Config

Targets

    • Target

      poisson.exe

    • Size

      107.1MB

    • MD5

      61c459021b9f18691dd574578e2f62b5

    • SHA1

      57ddfe62e58ca6a2fb899bc29e011c30870c6379

    • SHA256

      9342b721a094c6b8687b8a0b3f3e69109ec0135350435c80ae0676a277c3c77d

    • SHA512

      83c03c38c9b7875ff4d69d4f2704811f45b19f66b4ebf26c4ae1cf4191a69bb330d980a39a450541e4154020aa42a965905d4be92d9f3a55f86752179dcb9155

    • SSDEEP

      3145728:LgYRPSC++6y97iX5M3gbcKCVL2qHO5iDev279SY4:LxaC4y9uE2CVBHCiyv2p4

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks