General

  • Target

    chrome.exe

  • Size

    12.3MB

  • Sample

    241121-vzk4astpgv

  • MD5

    a77ebb32ac51d7605b33e3fdd8191f6e

  • SHA1

    4e91fa8d20ee82aec600ea233a65461d6c5717ee

  • SHA256

    32b8ac4b491b0d1be1f27c4e2531c4117aa928551b2ade3c0152c27808fedb2f

  • SHA512

    5d6ffcf6490dbc71fa81bd79e7dbca3067630331aeb199208486d983e7d402b5ff3aac4ad57b46dcd965b006c721d0b2e7be18e0bb941fa1b4b6c47ecaef7762

  • SSDEEP

    393216:jIFY+4quIREaCe0i5tNV8p9I5h+A9qZ2evV2rZBJi:MF5LuIxf9Vd5hNwZfvV24

Malware Config

Targets

    • Target

      chrome.exe

    • Size

      12.3MB

    • MD5

      a77ebb32ac51d7605b33e3fdd8191f6e

    • SHA1

      4e91fa8d20ee82aec600ea233a65461d6c5717ee

    • SHA256

      32b8ac4b491b0d1be1f27c4e2531c4117aa928551b2ade3c0152c27808fedb2f

    • SHA512

      5d6ffcf6490dbc71fa81bd79e7dbca3067630331aeb199208486d983e7d402b5ff3aac4ad57b46dcd965b006c721d0b2e7be18e0bb941fa1b4b6c47ecaef7762

    • SSDEEP

      393216:jIFY+4quIREaCe0i5tNV8p9I5h+A9qZ2evV2rZBJi:MF5LuIxf9Vd5hNwZfvV24

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks