General

  • Target

    7d4011f8ed3261b536722cdb4a1d636cbb8509e677fa7af3a548da3a724f1b7d

  • Size

    288KB

  • Sample

    221030-apmtxseacn

  • MD5

    9358ca9ed73f54fd8e2045b869bc58c0

  • SHA1

    d388c8c15784d545593e8dcd0e8054b54c32b4d6

  • SHA256

    7d4011f8ed3261b536722cdb4a1d636cbb8509e677fa7af3a548da3a724f1b7d

  • SHA512

    adaa8c541e4394e0f5cb68318e15612cb53e39289bea52134df7106a76a686ad49a034760dc4e7e72e71698273e311cdd9b2302bcd9470dd2d8f2b702e26a753

  • SSDEEP

    3072:uslKUOodRloToBY7ANErLuszP8gcfXDXlh/H5reJNCs6/t2eO38TFo0BWEW3gWFB:uslb7PGWY7AUusIVb3/HWzIZSahpc

Malware Config

Targets

    • Target

      7d4011f8ed3261b536722cdb4a1d636cbb8509e677fa7af3a548da3a724f1b7d

    • Size

      288KB

    • MD5

      9358ca9ed73f54fd8e2045b869bc58c0

    • SHA1

      d388c8c15784d545593e8dcd0e8054b54c32b4d6

    • SHA256

      7d4011f8ed3261b536722cdb4a1d636cbb8509e677fa7af3a548da3a724f1b7d

    • SHA512

      adaa8c541e4394e0f5cb68318e15612cb53e39289bea52134df7106a76a686ad49a034760dc4e7e72e71698273e311cdd9b2302bcd9470dd2d8f2b702e26a753

    • SSDEEP

      3072:uslKUOodRloToBY7ANErLuszP8gcfXDXlh/H5reJNCs6/t2eO38TFo0BWEW3gWFB:uslb7PGWY7AUusIVb3/HWzIZSahpc

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks