General

  • Target

    bc4a04120e21cedd4cf57aef24054a39fb16820fe370f85a8e70cd7b0871c351

  • Size

    169KB

  • Sample

    221029-wamfhagea6

  • MD5

    846b66f92a73dd216dd244c318311c9a

  • SHA1

    67e9445c87c3627c10c46b36b2aa48f8b5b8660b

  • SHA256

    bc4a04120e21cedd4cf57aef24054a39fb16820fe370f85a8e70cd7b0871c351

  • SHA512

    7ee384d5494c9bce80a643f8d621fcffb0322601b97fae1b87938505f5ee657a6135dc905ba60fe2f8c1481f158187c25f3b4f850c7759aeb1f03c420831d218

  • SSDEEP

    3072:grBmh/F9IlN7ga6NLpMcez23pggCFg/E3kQA4nq4HxgphheGb35gPKjHbVg:gK/F9I78Hez2ZZkg/E3kSBQeyqKjHG

Malware Config

Targets

    • Target

      bc4a04120e21cedd4cf57aef24054a39fb16820fe370f85a8e70cd7b0871c351

    • Size

      169KB

    • MD5

      846b66f92a73dd216dd244c318311c9a

    • SHA1

      67e9445c87c3627c10c46b36b2aa48f8b5b8660b

    • SHA256

      bc4a04120e21cedd4cf57aef24054a39fb16820fe370f85a8e70cd7b0871c351

    • SHA512

      7ee384d5494c9bce80a643f8d621fcffb0322601b97fae1b87938505f5ee657a6135dc905ba60fe2f8c1481f158187c25f3b4f850c7759aeb1f03c420831d218

    • SSDEEP

      3072:grBmh/F9IlN7ga6NLpMcez23pggCFg/E3kQA4nq4HxgphheGb35gPKjHbVg:gK/F9I78Hez2ZZkg/E3kSBQeyqKjHG

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks