General

  • Target

    fd74c505dfe98f01d8059aee83d68b69ac12216e18eafb75d6badd7e4aee38a7

  • Size

    7.2MB

  • Sample

    211207-p8vq7shdcj

  • MD5

    57a56615ff17551110947d9e9ef68c1b

  • SHA1

    00af278440d5708e9ac182cbd3a7d134b2ff9be1

  • SHA256

    fd74c505dfe98f01d8059aee83d68b69ac12216e18eafb75d6badd7e4aee38a7

  • SHA512

    65b8151e5790c9d387218aa7bb1d644c77d3058e1e4d7ad7cf43e1a8ec29c6e7bf241e6091031312debd8bfcf06987a77b581a135041e48f6f86a0bb0a15d5ed

Malware Config

Targets

    • Target

      fd74c505dfe98f01d8059aee83d68b69ac12216e18eafb75d6badd7e4aee38a7

    • Size

      7.2MB

    • MD5

      57a56615ff17551110947d9e9ef68c1b

    • SHA1

      00af278440d5708e9ac182cbd3a7d134b2ff9be1

    • SHA256

      fd74c505dfe98f01d8059aee83d68b69ac12216e18eafb75d6badd7e4aee38a7

    • SHA512

      65b8151e5790c9d387218aa7bb1d644c77d3058e1e4d7ad7cf43e1a8ec29c6e7bf241e6091031312debd8bfcf06987a77b581a135041e48f6f86a0bb0a15d5ed

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Tasks