General

  • Target

    f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b

  • Size

    346KB

  • Sample

    221127-kczytsgb5w

  • MD5

    eeeda99977b129a5e2d40542564df03e

  • SHA1

    d957db740670ec5222955e01de3b6afdfd8e4615

  • SHA256

    f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b

  • SHA512

    939461ada93524493ae96be29ee483d0180da8e7fce11e9055e85257c6c260603721743985a3bc803825c965fabe35db6cb296844a98ecf08ec54b683ed180c3

  • SSDEEP

    6144:iyfgDv5drb/TeVCm/Twf5q0KvNxyo+b6hNe+rgB86CnkUUGwA:TgNxbk3QEvNxyo1tgy6CJ

Malware Config

Targets

    • Target

      f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b

    • Size

      346KB

    • MD5

      eeeda99977b129a5e2d40542564df03e

    • SHA1

      d957db740670ec5222955e01de3b6afdfd8e4615

    • SHA256

      f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b

    • SHA512

      939461ada93524493ae96be29ee483d0180da8e7fce11e9055e85257c6c260603721743985a3bc803825c965fabe35db6cb296844a98ecf08ec54b683ed180c3

    • SSDEEP

      6144:iyfgDv5drb/TeVCm/Twf5q0KvNxyo+b6hNe+rgB86CnkUUGwA:TgNxbk3QEvNxyo1tgy6CJ

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks