General

  • Target

    abae79fffca34894a454c82c074fd56718c6954f7c44c1a8faac3405b50b009e

  • Size

    1.3MB

  • Sample

    221123-qn7qpsee27

  • MD5

    a4425b89e3cc570a5777cc56e264a883

  • SHA1

    1e269c18c2e96dda052714bf1f0cc12370082ac1

  • SHA256

    abae79fffca34894a454c82c074fd56718c6954f7c44c1a8faac3405b50b009e

  • SHA512

    5126722754936a5830b4a11271920d4308cc24246abeb684a492cfc39290748d598aec0335a74478cfa401e2756eaa0c661d756773ea87469ed78752e73f79f1

  • SSDEEP

    24576:wq5QPIvi0/QWqYID/aAIcDUebJvQiIE3kr:pSq7IUL2I

Malware Config

Targets

    • Target

      abae79fffca34894a454c82c074fd56718c6954f7c44c1a8faac3405b50b009e

    • Size

      1.3MB

    • MD5

      a4425b89e3cc570a5777cc56e264a883

    • SHA1

      1e269c18c2e96dda052714bf1f0cc12370082ac1

    • SHA256

      abae79fffca34894a454c82c074fd56718c6954f7c44c1a8faac3405b50b009e

    • SHA512

      5126722754936a5830b4a11271920d4308cc24246abeb684a492cfc39290748d598aec0335a74478cfa401e2756eaa0c661d756773ea87469ed78752e73f79f1

    • SSDEEP

      24576:wq5QPIvi0/QWqYID/aAIcDUebJvQiIE3kr:pSq7IUL2I

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks