General

  • Target

    4cdc3612052b8c79222cfea3bd26d201.exe

  • Size

    449KB

  • Sample

    201120-2dfgevlqnn

  • MD5

    4cdc3612052b8c79222cfea3bd26d201

  • SHA1

    3fd4af15b947f4f4eefc5992e1663d9029adddad

  • SHA256

    6e53f8abd9a57e4613e6afd1148f57dd6c7896c5c84b0ed05a8055b4e8d2fffa

  • SHA512

    f34afabb10e0a50f2904f3695ad9ba6c2bc469b851a145a1e9123f31f74757f61f3c5893ca2b2df14c11d2c6a7ae47fba75c4e74617c4cfa86d83d684632fe39

Score
7/10

Malware Config

Targets

    • Target

      4cdc3612052b8c79222cfea3bd26d201.exe

    • Size

      449KB

    • MD5

      4cdc3612052b8c79222cfea3bd26d201

    • SHA1

      3fd4af15b947f4f4eefc5992e1663d9029adddad

    • SHA256

      6e53f8abd9a57e4613e6afd1148f57dd6c7896c5c84b0ed05a8055b4e8d2fffa

    • SHA512

      f34afabb10e0a50f2904f3695ad9ba6c2bc469b851a145a1e9123f31f74757f61f3c5893ca2b2df14c11d2c6a7ae47fba75c4e74617c4cfa86d83d684632fe39

    Score
    7/10
    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks