General

  • Target

    2bd2597c0648b329ffb50c17458fdfb839ca3df390af5f93136af2b624aa95a9

  • Size

    600KB

  • Sample

    221029-wqyhpshca4

  • MD5

    5794f1dd7e46c5bc1e66c83aa1e7a870

  • SHA1

    f0907fbe1ec08294e4abc58839bbfd62fb48174b

  • SHA256

    2bd2597c0648b329ffb50c17458fdfb839ca3df390af5f93136af2b624aa95a9

  • SHA512

    5cecf763c87c618cc3f5984b2d11748f702a3c5b116f22d50553f03d2cc64fa9f9a6a9aac23105ed3719a0c6e9022e3a19fe9afb15a0c10ac2f63cbdc9d4826f

  • SSDEEP

    12288:f2OFaqz4tTEbmEIxASYfDNo0LOT1WDxyEQVcQVz7qtb2CV4qZlSg8fP8qa:+ykTESJxA3fZo0LOT+NScQYoQ8gaa

Malware Config

Targets

    • Target

      2bd2597c0648b329ffb50c17458fdfb839ca3df390af5f93136af2b624aa95a9

    • Size

      600KB

    • MD5

      5794f1dd7e46c5bc1e66c83aa1e7a870

    • SHA1

      f0907fbe1ec08294e4abc58839bbfd62fb48174b

    • SHA256

      2bd2597c0648b329ffb50c17458fdfb839ca3df390af5f93136af2b624aa95a9

    • SHA512

      5cecf763c87c618cc3f5984b2d11748f702a3c5b116f22d50553f03d2cc64fa9f9a6a9aac23105ed3719a0c6e9022e3a19fe9afb15a0c10ac2f63cbdc9d4826f

    • SSDEEP

      12288:f2OFaqz4tTEbmEIxASYfDNo0LOT1WDxyEQVcQVz7qtb2CV4qZlSg8fP8qa:+ykTESJxA3fZo0LOT+NScQYoQ8gaa

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks