General

  • Target

    750b54a709880f1a2b365ab60cf37116dff378b1062b88f7ffe50d4afeb385c6

  • Size

    743KB

  • Sample

    221011-skw6xabbf8

  • MD5

    69c6544d0026ed81030464a043e3feb1

  • SHA1

    5eb9ac6aefc93d2c734cc9d5a7eafaa00fe83f65

  • SHA256

    750b54a709880f1a2b365ab60cf37116dff378b1062b88f7ffe50d4afeb385c6

  • SHA512

    4a4ffb0114df8f8979c15b04e350b7e73a4fd4d4371ccd902f64fa927af46dab321c664e00514973294100789e679b56c392a165fb02908304a65caad0b72632

  • SSDEEP

    1536:g1/uvdsKTj+94nMEC2iLonhaAHO3A0MpVlVhfHQHHdNspr1hQEZHhE7fP8NXjr:7dsKn+94PaZsRZZBET0R

Malware Config

Targets

    • Target

      750b54a709880f1a2b365ab60cf37116dff378b1062b88f7ffe50d4afeb385c6

    • Size

      743KB

    • MD5

      69c6544d0026ed81030464a043e3feb1

    • SHA1

      5eb9ac6aefc93d2c734cc9d5a7eafaa00fe83f65

    • SHA256

      750b54a709880f1a2b365ab60cf37116dff378b1062b88f7ffe50d4afeb385c6

    • SHA512

      4a4ffb0114df8f8979c15b04e350b7e73a4fd4d4371ccd902f64fa927af46dab321c664e00514973294100789e679b56c392a165fb02908304a65caad0b72632

    • SSDEEP

      1536:g1/uvdsKTj+94nMEC2iLonhaAHO3A0MpVlVhfHQHHdNspr1hQEZHhE7fP8NXjr:7dsKn+94PaZsRZZBET0R

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks