General

  • Target

    c225a77d7628c1508fbd13ab01b9d4739ece192d842b9dcfdd7719a5398f4f8b

  • Size

    89KB

  • Sample

    240701-cr3z2awglq

  • MD5

    20f481d8eefecd5d3f8dcc9d3c0945ae

  • SHA1

    14bccd6b3b83fd1a3af432130dd8f00de61b3ffb

  • SHA256

    c225a77d7628c1508fbd13ab01b9d4739ece192d842b9dcfdd7719a5398f4f8b

  • SHA512

    28dc22498fc14f4285db629c256603a0a5f4f1a9109c12e30341d6f4ba31f056b2acde275615261e8de7a63eba25df3e0f0871fc2cb70ba71217022d7507adf9

  • SSDEEP

    1536:t3x85+Ks2wAc64BDSkuP6y+DXibt3GOYbm2ey6UDN8FzgBIISH/0Y:th85+Ks7DlSk4+D23G62ey6gmNIY

Malware Config

Targets

    • Target

      c225a77d7628c1508fbd13ab01b9d4739ece192d842b9dcfdd7719a5398f4f8b

    • Size

      89KB

    • MD5

      20f481d8eefecd5d3f8dcc9d3c0945ae

    • SHA1

      14bccd6b3b83fd1a3af432130dd8f00de61b3ffb

    • SHA256

      c225a77d7628c1508fbd13ab01b9d4739ece192d842b9dcfdd7719a5398f4f8b

    • SHA512

      28dc22498fc14f4285db629c256603a0a5f4f1a9109c12e30341d6f4ba31f056b2acde275615261e8de7a63eba25df3e0f0871fc2cb70ba71217022d7507adf9

    • SSDEEP

      1536:t3x85+Ks2wAc64BDSkuP6y+DXibt3GOYbm2ey6UDN8FzgBIISH/0Y:th85+Ks7DlSk4+D23G62ey6gmNIY

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks