General

  • Target

    setup.exe

  • Size

    4.8MB

  • Sample

    221107-fpq48scbbl

  • MD5

    bff5ad2f9d3b589162a2da7a337a68c2

  • SHA1

    b2879c2d9e6401619f4e2db6470b662685ab7756

  • SHA256

    6abf54467c1c8eca444f8ad7aca5a2b1819c8482a0110116bf67f2ebe1021fce

  • SHA512

    961445f139625d22704758432c1d568b59975948eb7e49fd1acb7ce185296e23f72be37f0bb0d9af1f929eef1ccf8a738a9bef4b2b7a798e21e319bc34bc378d

  • SSDEEP

    49152:JG9RuK1L8CnoJgsv5lpt8xGAckMREkaT5E5gtGQnldHVd+01:yuLD5Xm1EAG8l

Malware Config

Targets

    • Target

      setup.exe

    • Size

      4.8MB

    • MD5

      bff5ad2f9d3b589162a2da7a337a68c2

    • SHA1

      b2879c2d9e6401619f4e2db6470b662685ab7756

    • SHA256

      6abf54467c1c8eca444f8ad7aca5a2b1819c8482a0110116bf67f2ebe1021fce

    • SHA512

      961445f139625d22704758432c1d568b59975948eb7e49fd1acb7ce185296e23f72be37f0bb0d9af1f929eef1ccf8a738a9bef4b2b7a798e21e319bc34bc378d

    • SSDEEP

      49152:JG9RuK1L8CnoJgsv5lpt8xGAckMREkaT5E5gtGQnldHVd+01:yuLD5Xm1EAG8l

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks