General

  • Target

    edadbc776dadba188b583aa8cb5615bc2a175e15fffc1ceba665ee6ea50e246b

  • Size

    1.5MB

  • Sample

    221029-h1elpafhfq

  • MD5

    94f720790cfe857c4aff758bc671133f

  • SHA1

    b6debf7a5a4798e01a81435c1b977a5d3584f7ac

  • SHA256

    edadbc776dadba188b583aa8cb5615bc2a175e15fffc1ceba665ee6ea50e246b

  • SHA512

    5322300105787d4241356db5afb275a17c2ebe2b6407e1674bc0fff993562596e35b8fa68b9a2e019c3bbba05693e241434e6d4dae296edb7409cfce53265112

  • SSDEEP

    24576:bkNkiI3rh3eSaSZ+jF2z80Y09bHJCveXEHXsTkz8TkV7QROn1tTeRWQ:b3iI3rj2jF2z80JbJEHXoTDsn1tSh

Malware Config

Targets

    • Target

      edadbc776dadba188b583aa8cb5615bc2a175e15fffc1ceba665ee6ea50e246b

    • Size

      1.5MB

    • MD5

      94f720790cfe857c4aff758bc671133f

    • SHA1

      b6debf7a5a4798e01a81435c1b977a5d3584f7ac

    • SHA256

      edadbc776dadba188b583aa8cb5615bc2a175e15fffc1ceba665ee6ea50e246b

    • SHA512

      5322300105787d4241356db5afb275a17c2ebe2b6407e1674bc0fff993562596e35b8fa68b9a2e019c3bbba05693e241434e6d4dae296edb7409cfce53265112

    • SSDEEP

      24576:bkNkiI3rh3eSaSZ+jF2z80Y09bHJCveXEHXsTkz8TkV7QROn1tTeRWQ:b3iI3rj2jF2z80JbJEHXoTDsn1tSh

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook accounts

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks