General

  • Target

    b78501467cdefa633a779ae088d4c382133d56d4f0b8262e5e26628d29616bad

  • Size

    55KB

  • Sample

    221201-xlsx4aad75

  • MD5

    d56a81ba4d45edfb6079b86006479a6a

  • SHA1

    b9834b262b65d90e75f74081f2a630590f2ebf15

  • SHA256

    b78501467cdefa633a779ae088d4c382133d56d4f0b8262e5e26628d29616bad

  • SHA512

    738d239d04fab997dc876ed79f2505ade3b53d6003ab1dddb869a136eeed05497564bd80a6f6b9b001b6c1b71e0893f2929cfb5cbf368569fbda62ca4e73e83f

  • SSDEEP

    384:8mnEj902rZHZlBZObZOac/DuQU/2QqHsMSB99g6sTw2CrAwutwl5ESptKT11:xEj908BZRaKyqH4jqTacwut65ES3KT/

Malware Config

Targets

    • Target

      b78501467cdefa633a779ae088d4c382133d56d4f0b8262e5e26628d29616bad

    • Size

      55KB

    • MD5

      d56a81ba4d45edfb6079b86006479a6a

    • SHA1

      b9834b262b65d90e75f74081f2a630590f2ebf15

    • SHA256

      b78501467cdefa633a779ae088d4c382133d56d4f0b8262e5e26628d29616bad

    • SHA512

      738d239d04fab997dc876ed79f2505ade3b53d6003ab1dddb869a136eeed05497564bd80a6f6b9b001b6c1b71e0893f2929cfb5cbf368569fbda62ca4e73e83f

    • SSDEEP

      384:8mnEj902rZHZlBZObZOac/DuQU/2QqHsMSB99g6sTw2CrAwutwl5ESptKT11:xEj908BZRaKyqH4jqTacwut65ES3KT/

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks