General

  • Target

    fcc09a5be47bc5bfa35f32270bc00353dd5c6ce327760b61b8b9af7952be1f34

  • Size

    468KB

  • Sample

    221124-dewkvsfh9s

  • MD5

    d6d8d85a9e8d51ebccc5c2dbce142103

  • SHA1

    2c59c931260a5802a038c777186dddce11397fe2

  • SHA256

    fcc09a5be47bc5bfa35f32270bc00353dd5c6ce327760b61b8b9af7952be1f34

  • SHA512

    99aee273d75170ac28df316049a332536639bbd2676aafddfcb7f67763c02e88bd75d2bbd967f8b966997db98f38e370c4af0c215152875968c3fe347799866f

  • SSDEEP

    12288:VuC+3L0bELfWKFS/8Mm9+YCY2aTOqidxjut:V9WKAfYI4YCY2aPin

Malware Config

Targets

    • Target

      fcc09a5be47bc5bfa35f32270bc00353dd5c6ce327760b61b8b9af7952be1f34

    • Size

      468KB

    • MD5

      d6d8d85a9e8d51ebccc5c2dbce142103

    • SHA1

      2c59c931260a5802a038c777186dddce11397fe2

    • SHA256

      fcc09a5be47bc5bfa35f32270bc00353dd5c6ce327760b61b8b9af7952be1f34

    • SHA512

      99aee273d75170ac28df316049a332536639bbd2676aafddfcb7f67763c02e88bd75d2bbd967f8b966997db98f38e370c4af0c215152875968c3fe347799866f

    • SSDEEP

      12288:VuC+3L0bELfWKFS/8Mm9+YCY2aTOqidxjut:V9WKAfYI4YCY2aPin

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for any installed AV software in registry

MITRE ATT&CK Enterprise v6

Tasks