General

  • Target

    5d39470a7b8e1aa6c0691dbc929078a0810da34ee955f1869a309ca9840b948d

  • Size

    260KB

  • Sample

    221201-3dctsseh3t

  • MD5

    55047507539c76cb78077af962c071b0

  • SHA1

    d20f11aaf898201c8d8d617a9ef45edfd613d077

  • SHA256

    5d39470a7b8e1aa6c0691dbc929078a0810da34ee955f1869a309ca9840b948d

  • SHA512

    800a5f41539bf705084d41282e24fcc4f4e2af282b9ad4d6865637378dd7ac0372d2be558be9bca233cd6f46eaf45c4b5edd7d4d448e051f4eb2f11a69b5d619

  • SSDEEP

    6144:ntfG12nqw7EB1XbtFZjkeQYsJlW+U9kzMv7hornBshW63:ntgPw7EvXbt/WTzK7Iny

Malware Config

Targets

    • Target

      5d39470a7b8e1aa6c0691dbc929078a0810da34ee955f1869a309ca9840b948d

    • Size

      260KB

    • MD5

      55047507539c76cb78077af962c071b0

    • SHA1

      d20f11aaf898201c8d8d617a9ef45edfd613d077

    • SHA256

      5d39470a7b8e1aa6c0691dbc929078a0810da34ee955f1869a309ca9840b948d

    • SHA512

      800a5f41539bf705084d41282e24fcc4f4e2af282b9ad4d6865637378dd7ac0372d2be558be9bca233cd6f46eaf45c4b5edd7d4d448e051f4eb2f11a69b5d619

    • SSDEEP

      6144:ntfG12nqw7EB1XbtFZjkeQYsJlW+U9kzMv7hornBshW63:ntgPw7EvXbt/WTzK7Iny

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks