General

  • Target

    da4d0b3815275f086f7f8083be092dd05086f1f844a0b24bdc87affea76c8fba

  • Size

    3.2MB

  • Sample

    240701-dzdwjsyaqk

  • MD5

    ed5b27e7236928dfea15258778557f3a

  • SHA1

    e8fbc9d9a3dd0c81b70c0f69f6491199ad2ef167

  • SHA256

    da4d0b3815275f086f7f8083be092dd05086f1f844a0b24bdc87affea76c8fba

  • SHA512

    23fc5b9dd228baab034d5202af781b8b86faa0f03416ae8893f6081cc4aa593b583c729dcae7a8785df39c32f44ba803f351c310d685d475db12eb6dcc59b64f

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBzB/bSqz8:sxX7QnxrloE5dpUpkbVz8

Malware Config

Targets

    • Target

      da4d0b3815275f086f7f8083be092dd05086f1f844a0b24bdc87affea76c8fba

    • Size

      3.2MB

    • MD5

      ed5b27e7236928dfea15258778557f3a

    • SHA1

      e8fbc9d9a3dd0c81b70c0f69f6491199ad2ef167

    • SHA256

      da4d0b3815275f086f7f8083be092dd05086f1f844a0b24bdc87affea76c8fba

    • SHA512

      23fc5b9dd228baab034d5202af781b8b86faa0f03416ae8893f6081cc4aa593b583c729dcae7a8785df39c32f44ba803f351c310d685d475db12eb6dcc59b64f

    • SSDEEP

      49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBzB/bSqz8:sxX7QnxrloE5dpUpkbVz8

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks