General

  • Target

    tmp

  • Size

    11.1MB

  • Sample

    220409-27t5haeac9

  • MD5

    a1188df640d34bda4872725259e7745e

  • SHA1

    4a87bacdf63c6dc8dbef467bc735d3165b9051fe

  • SHA256

    fd76e8e1f0c3261b50f20fa921b782df82544255d34bc9e21f0bb8beaf31bc12

  • SHA512

    353ef676f8743249b9b2923ac9d9f31e6fb6173b9f2c2487e4215bc68c085582998d3c36d736f3b4575799e097f4fc8fc568ac1399bcd49e62fd2ebf1d753f22

Malware Config

Targets

    • Target

      tmp

    • Size

      11.1MB

    • MD5

      a1188df640d34bda4872725259e7745e

    • SHA1

      4a87bacdf63c6dc8dbef467bc735d3165b9051fe

    • SHA256

      fd76e8e1f0c3261b50f20fa921b782df82544255d34bc9e21f0bb8beaf31bc12

    • SHA512

      353ef676f8743249b9b2923ac9d9f31e6fb6173b9f2c2487e4215bc68c085582998d3c36d736f3b4575799e097f4fc8fc568ac1399bcd49e62fd2ebf1d753f22

    • LoaderBot

      LoaderBot is a loader written in .NET downloading and executing miners.

    • LoaderBot executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks