General

  • Target

    Attached is the new order, mecano group.exe

  • Size

    1.1MB

  • Sample

    200713-st7z41n47x

  • MD5

    727396a68b9b5cbf700d7b948db6d830

  • SHA1

    bd50594103f8554d8e076f0cc3a5a65c95586bee

  • SHA256

    ca1d053d41842ab4052e83f395cfef43d3b79f16a5c437fbfcc10fef27c97ca8

  • SHA512

    a1a1129d9630a3731daaf22bf67baa655bf8026da116e69d008641e9697dbaab9ac78a6a2c5acdeb733df64c8a343c88ef822adf07ace41cf95fbb64d8c0f3df

Malware Config

Targets

    • Target

      Attached is the new order, mecano group.exe

    • Size

      1.1MB

    • MD5

      727396a68b9b5cbf700d7b948db6d830

    • SHA1

      bd50594103f8554d8e076f0cc3a5a65c95586bee

    • SHA256

      ca1d053d41842ab4052e83f395cfef43d3b79f16a5c437fbfcc10fef27c97ca8

    • SHA512

      a1a1129d9630a3731daaf22bf67baa655bf8026da116e69d008641e9697dbaab9ac78a6a2c5acdeb733df64c8a343c88ef822adf07ace41cf95fbb64d8c0f3df

    • Adds Run entry to policy start application

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run entry to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks