General

  • Target

    order.exe

  • Size

    399KB

  • Sample

    200709-jqcqa63tnj

  • MD5

    d3f4595f210be5a466132637036d72c3

  • SHA1

    980d63586e5116fdcbe87fe4e5914429a96f8655

  • SHA256

    5962532a97c0efd1227d42aeddeacf09c0f8c8787e476e650d71ceed4ed52d97

  • SHA512

    f263c92b4a966c1a5d916ec130a44eb75f87800165a81d9752248eede5f519cad9589e0a597a1249b9c36f2ed0ae0fa6eef445113b86ef934ca19c49b2b392f5

Malware Config

Targets

    • Target

      order.exe

    • Size

      399KB

    • MD5

      d3f4595f210be5a466132637036d72c3

    • SHA1

      980d63586e5116fdcbe87fe4e5914429a96f8655

    • SHA256

      5962532a97c0efd1227d42aeddeacf09c0f8c8787e476e650d71ceed4ed52d97

    • SHA512

      f263c92b4a966c1a5d916ec130a44eb75f87800165a81d9752248eede5f519cad9589e0a597a1249b9c36f2ed0ae0fa6eef445113b86ef934ca19c49b2b392f5

    • Adds Run entry to policy start application

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks