General

  • Target

    f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303

  • Size

    25KB

  • Sample

    221204-a84a1sgb6y

  • MD5

    ed0254080a949b33a98234043e56f0d7

  • SHA1

    15e1d156d2610e17a7fa06225fdfdefc091f6323

  • SHA256

    f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303

  • SHA512

    eb029ee30f48b7451573d87db999dc471ea2893b8d1ff2aa1561e4f4e6f7dedc381b4bb025e5bc56314201b889f73c1eaa7efbd7603c41a95fa411843154f329

  • SSDEEP

    384:MUU39SStAWybDMz6HAHNHiGtDNPTVoLDYuFdslvr6gL3lR0NIgdd6xl3sy3jSqM2:oSStAWybQ6Haz96dsdNLUZdwlD3jSq

Malware Config

Targets

    • Target

      f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303

    • Size

      25KB

    • MD5

      ed0254080a949b33a98234043e56f0d7

    • SHA1

      15e1d156d2610e17a7fa06225fdfdefc091f6323

    • SHA256

      f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303

    • SHA512

      eb029ee30f48b7451573d87db999dc471ea2893b8d1ff2aa1561e4f4e6f7dedc381b4bb025e5bc56314201b889f73c1eaa7efbd7603c41a95fa411843154f329

    • SSDEEP

      384:MUU39SStAWybDMz6HAHNHiGtDNPTVoLDYuFdslvr6gL3lR0NIgdd6xl3sy3jSqM2:oSStAWybQ6Haz96dsdNLUZdwlD3jSq

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks