General

  • Target

    ChromeSetup.exe

  • Size

    8.5MB

  • Sample

    240919-sc3cysvbne

  • MD5

    919bf3c2f66a36c0980bf73220691ab0

  • SHA1

    04ea003a184005e3a8795374898ca449ec74a59c

  • SHA256

    30c59d9ddf6eb969ce93cb533f1f11a458ba7c4904e55dd781cbf09f58944595

  • SHA512

    9101fc61646200640e934a200dc91f324fab36fb63821f89f4b338d9e0424230130ae73e6147ef4e5d2807c6150dc7409b4f31e16a5640b98e21002d0b24f06f

  • SSDEEP

    196608:ZNWvMZmI8qx5AxLg+mB6qDVKrNo+RpPOSdeIZ5yH+7BzLZMYFnIwBxu330G:Za4Wqx5YLg+y/DVKrNoCPoIZ5I+7B/25

Malware Config

Targets

    • Target

      ChromeSetup.exe

    • Size

      8.5MB

    • MD5

      919bf3c2f66a36c0980bf73220691ab0

    • SHA1

      04ea003a184005e3a8795374898ca449ec74a59c

    • SHA256

      30c59d9ddf6eb969ce93cb533f1f11a458ba7c4904e55dd781cbf09f58944595

    • SHA512

      9101fc61646200640e934a200dc91f324fab36fb63821f89f4b338d9e0424230130ae73e6147ef4e5d2807c6150dc7409b4f31e16a5640b98e21002d0b24f06f

    • SSDEEP

      196608:ZNWvMZmI8qx5AxLg+mB6qDVKrNo+RpPOSdeIZ5yH+7BzLZMYFnIwBxu330G:Za4Wqx5YLg+y/DVKrNoCPoIZ5I+7B/25

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks