General

  • Target

    4cf4813674f695b2504da013cff10ee0928a4ae1e29de524538b360a30f3bb49

  • Size

    15.0MB

  • Sample

    221103-w37xxadeg5

  • MD5

    afebb714fde53a1ef8f9a1a643b3e32b

  • SHA1

    0f2b46856453a146a68ac46e722fbee17eb5f2f0

  • SHA256

    4cf4813674f695b2504da013cff10ee0928a4ae1e29de524538b360a30f3bb49

  • SHA512

    e2ce934ecbd1963c35b118e622eece2a819a47888e77a51040f55bd38f3a132db07f0c2b54e69b0d2975623db166e57a8819a535d2ce8cf76630e7f9b1b80adb

  • SSDEEP

    393216:7zZ2FzfhINa5Njo4648RhlaO6EUkuo8TYtPt:79QzfiUjoAV3EUR0ht

Score
10/10

Malware Config

Targets

    • Target

      4cf4813674f695b2504da013cff10ee0928a4ae1e29de524538b360a30f3bb49

    • Size

      15.0MB

    • MD5

      afebb714fde53a1ef8f9a1a643b3e32b

    • SHA1

      0f2b46856453a146a68ac46e722fbee17eb5f2f0

    • SHA256

      4cf4813674f695b2504da013cff10ee0928a4ae1e29de524538b360a30f3bb49

    • SHA512

      e2ce934ecbd1963c35b118e622eece2a819a47888e77a51040f55bd38f3a132db07f0c2b54e69b0d2975623db166e57a8819a535d2ce8cf76630e7f9b1b80adb

    • SSDEEP

      393216:7zZ2FzfhINa5Njo4648RhlaO6EUkuo8TYtPt:79QzfiUjoAV3EUR0ht

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks