General

  • Target

    282565fd7f27317787ad83ed92a8e2a9ee6cde2d095de23f9e025ec6efcf8e02N

  • Size

    1.4MB

  • Sample

    241109-s25jlsxcnd

  • MD5

    5b82e1f551c557565bb034f0aab21e90

  • SHA1

    3d4c600501219726f070c194d25e5e482fd10445

  • SHA256

    282565fd7f27317787ad83ed92a8e2a9ee6cde2d095de23f9e025ec6efcf8e02

  • SHA512

    6a8e9fae55d7780c7b197c24f5351b9fb12a1c5bca024a4e84957890f97c4181f33467b39291e4785e475078cca2237512a55d3a2f19d902e57bcf86cb62912f

  • SSDEEP

    24576:LPQhskg+ES4gT7C7QmmkQ9b2YKfPSd0Au7LQPJKyIEQMBSMG1f687iAPaPxqcHO:LP6g5S4H7Qmmvb2jfPQBcyIEzAGAPaUT

Malware Config

Targets

    • Target

      282565fd7f27317787ad83ed92a8e2a9ee6cde2d095de23f9e025ec6efcf8e02N

    • Size

      1.4MB

    • MD5

      5b82e1f551c557565bb034f0aab21e90

    • SHA1

      3d4c600501219726f070c194d25e5e482fd10445

    • SHA256

      282565fd7f27317787ad83ed92a8e2a9ee6cde2d095de23f9e025ec6efcf8e02

    • SHA512

      6a8e9fae55d7780c7b197c24f5351b9fb12a1c5bca024a4e84957890f97c4181f33467b39291e4785e475078cca2237512a55d3a2f19d902e57bcf86cb62912f

    • SSDEEP

      24576:LPQhskg+ES4gT7C7QmmkQ9b2YKfPSd0Au7LQPJKyIEQMBSMG1f687iAPaPxqcHO:LP6g5S4H7Qmmvb2jfPQBcyIEzAGAPaUT

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

MITRE ATT&CK Enterprise v15

Tasks