General

  • Target

    8688cae5f3d97116fa5f1f7e18b02073303a2837f2420c71b7daf4fc3d8dd2c9

  • Size

    537KB

  • Sample

    221201-b7dveadc53

  • MD5

    e34be37ea56e90609c46364e91aec143

  • SHA1

    3cc3d72c992f1672a9ace87fdf58ca94116850eb

  • SHA256

    8688cae5f3d97116fa5f1f7e18b02073303a2837f2420c71b7daf4fc3d8dd2c9

  • SHA512

    599e67b50ee5e9175623fcb5cf793ee47c9d68bb8d6ca2fdbaf0371df360efa02016819e5c3956d73c0e129e088d45f10e336864ff2d0853a970132ab9d4f172

  • SSDEEP

    6144:b1dlZro5yCncLWo64/ZnbraJ8xqzH8wAhLoDv1W8yng98EauDKkMpZ7e8CUfnIXY:b1dlZo5yWcO4Nhxq7ZvAWRxwS4nUX28i

Score
8/10

Malware Config

Targets

    • Target

      8688cae5f3d97116fa5f1f7e18b02073303a2837f2420c71b7daf4fc3d8dd2c9

    • Size

      537KB

    • MD5

      e34be37ea56e90609c46364e91aec143

    • SHA1

      3cc3d72c992f1672a9ace87fdf58ca94116850eb

    • SHA256

      8688cae5f3d97116fa5f1f7e18b02073303a2837f2420c71b7daf4fc3d8dd2c9

    • SHA512

      599e67b50ee5e9175623fcb5cf793ee47c9d68bb8d6ca2fdbaf0371df360efa02016819e5c3956d73c0e129e088d45f10e336864ff2d0853a970132ab9d4f172

    • SSDEEP

      6144:b1dlZro5yCncLWo64/ZnbraJ8xqzH8wAhLoDv1W8yng98EauDKkMpZ7e8CUfnIXY:b1dlZo5yWcO4Nhxq7ZvAWRxwS4nUX28i

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks