General

  • Target

    3fb846d3691f3d98a34e669e1b9b5bf6.bin

  • Size

    10.1MB

  • Sample

    240701-b46e9awbkk

  • MD5

    3fb846d3691f3d98a34e669e1b9b5bf6

  • SHA1

    4c90c2912aae3b8da4c44a4faa0b8df20525285f

  • SHA256

    ead7a779cabae642d09be07283cc99e53c84ecf90349444e0d0ac4bf9901fe47

  • SHA512

    e904ecfa7b1c9ba066272bf91b8341bf3877310613370defabee7db58ea825c52582353e97f9398d706d3f3890b3701a1c05fe202e8a87499fb9600f87176b3e

  • SSDEEP

    196608:Ddad4T0xcsSB5orrcbSsi0s/lmPJ7N3VvXWrqufezvq:xadCoXrlAJ7N3pXW2uGzy

Malware Config

Targets

    • Target

      3fb846d3691f3d98a34e669e1b9b5bf6.bin

    • Size

      10.1MB

    • MD5

      3fb846d3691f3d98a34e669e1b9b5bf6

    • SHA1

      4c90c2912aae3b8da4c44a4faa0b8df20525285f

    • SHA256

      ead7a779cabae642d09be07283cc99e53c84ecf90349444e0d0ac4bf9901fe47

    • SHA512

      e904ecfa7b1c9ba066272bf91b8341bf3877310613370defabee7db58ea825c52582353e97f9398d706d3f3890b3701a1c05fe202e8a87499fb9600f87176b3e

    • SSDEEP

      196608:Ddad4T0xcsSB5orrcbSsi0s/lmPJ7N3VvXWrqufezvq:xadCoXrlAJ7N3pXW2uGzy

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks