General

  • Target

    5a6f2afa67b5990e5c98f552edf38f47c922e604df8f12ddc9d29f9c3eb5a57e

  • Size

    364KB

  • Sample

    221201-3mdgpacd88

  • MD5

    0b55c7704485d1e6caed24a2a5fdb2d4

  • SHA1

    d036d434699980e82ac853d370b5d834d2b86027

  • SHA256

    5a6f2afa67b5990e5c98f552edf38f47c922e604df8f12ddc9d29f9c3eb5a57e

  • SHA512

    282ed15ace741001a4d0d92412a8aa65fdb68503fc6ccee20b405b04dbe427684b8913b4c0f0b9cee815ba18e86912eaf582c6eab7be79ba8d2dc33b786c02d6

  • SSDEEP

    6144:iDQjN+rCq6/1FQr7SxJrLv/ITroAqUbsNpITS+:i32q6/3/ITroAqUbSpIT

Malware Config

Targets

    • Target

      5a6f2afa67b5990e5c98f552edf38f47c922e604df8f12ddc9d29f9c3eb5a57e

    • Size

      364KB

    • MD5

      0b55c7704485d1e6caed24a2a5fdb2d4

    • SHA1

      d036d434699980e82ac853d370b5d834d2b86027

    • SHA256

      5a6f2afa67b5990e5c98f552edf38f47c922e604df8f12ddc9d29f9c3eb5a57e

    • SHA512

      282ed15ace741001a4d0d92412a8aa65fdb68503fc6ccee20b405b04dbe427684b8913b4c0f0b9cee815ba18e86912eaf582c6eab7be79ba8d2dc33b786c02d6

    • SSDEEP

      6144:iDQjN+rCq6/1FQr7SxJrLv/ITroAqUbsNpITS+:i32q6/3/ITroAqUbSpIT

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks