General

  • Target

    dc1e9dc86c50317fac50c8a486c87d1344afda4c79ae4e2567db7916b31d6c52.exe

  • Size

    1.5MB

  • Sample

    250113-sgzsmawnbs

  • MD5

    906f9e9c186a8d6fffaefe87e3c7d5b8

  • SHA1

    819df47445095666a46b56045414238ffa334c23

  • SHA256

    dc1e9dc86c50317fac50c8a486c87d1344afda4c79ae4e2567db7916b31d6c52

  • SHA512

    82000769232be8edb2da8f7aa74f32f75592f390485a4f6e6adf0f3fa8061a7917398c544f4b78a4e378bd7c101874e1b07bd5f3e411c06904d635188ddfb4ed

  • SSDEEP

    49152:oTvC/MTQYxsWR7aWH3N50VVc+O9B9+p8:gjTQYxsWRPdKc+A++

Malware Config

Extracted

Family

metastealer

C2

kiyaqoimsiieeyqa.xyz

ssqsmisuowqcwsqo.xyz

ykqmwgsuummieaug.xyz

ewukeskgqswqesiw.xyz

cscqcsgewmwwaaui.xyz

cyoksykiamiscyia.xyz

okgomokemoucqeso.xyz

ikwacuakiqeimwua.xyz

aawcsqqaywckiwmi.xyz

aiqasksgmyeqocei.xyz

qgumcuisgaeyuqqe.xyz

eiesoycamyqqgcea.xyz

ywceswakicsqomqw.xyz

auaieuewouawygku.xyz

cmiascusccywowcs.xyz

uiqkkomkaceqacec.xyz

quqeciymqmkqccqw.xyz

ssqsauuuyyigouou.xyz

aogaakukuugqswcy.xyz

ucgwcwsuqsuwewgc.xyz

Attributes
  • dga_seed

    21845

  • domain_length

    16

  • num_dga_domains

    10000

  • port

    443

Targets

    • Target

      dc1e9dc86c50317fac50c8a486c87d1344afda4c79ae4e2567db7916b31d6c52.exe

    • Size

      1.5MB

    • MD5

      906f9e9c186a8d6fffaefe87e3c7d5b8

    • SHA1

      819df47445095666a46b56045414238ffa334c23

    • SHA256

      dc1e9dc86c50317fac50c8a486c87d1344afda4c79ae4e2567db7916b31d6c52

    • SHA512

      82000769232be8edb2da8f7aa74f32f75592f390485a4f6e6adf0f3fa8061a7917398c544f4b78a4e378bd7c101874e1b07bd5f3e411c06904d635188ddfb4ed

    • SSDEEP

      49152:oTvC/MTQYxsWR7aWH3N50VVc+O9B9+p8:gjTQYxsWRPdKc+A++

    • Meta Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • MetaStealer payload

    • Metastealer family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks