General

  • Target

    dccce8fd062cf38bdbd04da6f0ee88ec41efab06c3b69b420141f8d6555b41d9

  • Size

    664KB

  • Sample

    221201-vce9jacd6y

  • MD5

    fb177941496226058c3cd7e407d73264

  • SHA1

    1b57d3ba4a823c6d47487c9c61877e2b68fae6bb

  • SHA256

    dccce8fd062cf38bdbd04da6f0ee88ec41efab06c3b69b420141f8d6555b41d9

  • SHA512

    c01c3b88cdf9fafe3a94124a6167ba149ec3259df9c514c41cb5497554fa8eb0813a549594de4656f831e91aeeefad4a497d1c36ccf121bebb41c45cfc5607ab

  • SSDEEP

    12288:kxpz4TolPke11PbUcqcyylNoJSKT4Cw5ZqDrqKgA96MmAgjkH0DZVrU:kxF40pkW1j5LyylNoJSpCi4p96MulZV4

Malware Config

Targets

    • Target

      dccce8fd062cf38bdbd04da6f0ee88ec41efab06c3b69b420141f8d6555b41d9

    • Size

      664KB

    • MD5

      fb177941496226058c3cd7e407d73264

    • SHA1

      1b57d3ba4a823c6d47487c9c61877e2b68fae6bb

    • SHA256

      dccce8fd062cf38bdbd04da6f0ee88ec41efab06c3b69b420141f8d6555b41d9

    • SHA512

      c01c3b88cdf9fafe3a94124a6167ba149ec3259df9c514c41cb5497554fa8eb0813a549594de4656f831e91aeeefad4a497d1c36ccf121bebb41c45cfc5607ab

    • SSDEEP

      12288:kxpz4TolPke11PbUcqcyylNoJSKT4Cw5ZqDrqKgA96MmAgjkH0DZVrU:kxF40pkW1j5LyylNoJSpCi4p96MulZV4

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks