General

  • Target

    instruction.exe

  • Size

    40KB

  • Sample

    210722-r2rsb1wsxn

  • MD5

    7ca5b52fcbb8ba6c63bf8ae968bd67b2

  • SHA1

    fe7ecee9aae7bf4a929c7d4e9c83555a3547be5a

  • SHA256

    29f14e7fdbdaa7a83fe45648e64d2e0417a05ff5e17cd7729865a2b75b9ef465

  • SHA512

    bb401742288394dd4c8ca0cb04ff4cbbb57644fdd4b64450eba02a5cc2fd60a14aee0b965ecf9789024ceacd77101841cf72c9d8f069cc0807c8a7f3a5f57662

Malware Config

Targets

    • Target

      instruction.exe

    • Size

      40KB

    • MD5

      7ca5b52fcbb8ba6c63bf8ae968bd67b2

    • SHA1

      fe7ecee9aae7bf4a929c7d4e9c83555a3547be5a

    • SHA256

      29f14e7fdbdaa7a83fe45648e64d2e0417a05ff5e17cd7729865a2b75b9ef465

    • SHA512

      bb401742288394dd4c8ca0cb04ff4cbbb57644fdd4b64450eba02a5cc2fd60a14aee0b965ecf9789024ceacd77101841cf72c9d8f069cc0807c8a7f3a5f57662

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks