General

  • Target

    42fa5b78b18239d0a0e140352b0052095c529fb2499f9e7b41560222e16d30b2

  • Size

    1.9MB

  • Sample

    221127-ep385ace91

  • MD5

    cfc99b9f63979b39e37bbe2a8811b8a8

  • SHA1

    9a2061edb53df5a937b455938185b0cb6aeb46c8

  • SHA256

    42fa5b78b18239d0a0e140352b0052095c529fb2499f9e7b41560222e16d30b2

  • SHA512

    8eda0061246dec5d8bcac8b7c27786ed3cdd94b61f5c70bd2d58642b7a8246d23465aea1209d3e2b0ab8e6ebeb3abad6604f5c7fc426edf7bd7d7fabf6f79a84

  • SSDEEP

    49152:lXz+1OvV11rjqdO5tFL16WT53GJAkpeVCmJUn8pOX:lXz+1Ot1lWdocWT52ukmCmCn8pOX

Malware Config

Targets

    • Target

      42fa5b78b18239d0a0e140352b0052095c529fb2499f9e7b41560222e16d30b2

    • Size

      1.9MB

    • MD5

      cfc99b9f63979b39e37bbe2a8811b8a8

    • SHA1

      9a2061edb53df5a937b455938185b0cb6aeb46c8

    • SHA256

      42fa5b78b18239d0a0e140352b0052095c529fb2499f9e7b41560222e16d30b2

    • SHA512

      8eda0061246dec5d8bcac8b7c27786ed3cdd94b61f5c70bd2d58642b7a8246d23465aea1209d3e2b0ab8e6ebeb3abad6604f5c7fc426edf7bd7d7fabf6f79a84

    • SSDEEP

      49152:lXz+1OvV11rjqdO5tFL16WT53GJAkpeVCmJUn8pOX:lXz+1Ot1lWdocWT52ukmCmCn8pOX

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks