General

  • Target

    10872da68ef042b6c9dfaacfd15b00dee1b0e8b75c7d425d9c7dc67699eca8fa.exe

  • Size

    7.2MB

  • Sample

    221205-3vzd5acd2w

  • MD5

    6f668dfb8128b5a5b4f329dea7458fac

  • SHA1

    3e44c697516f76b275a297213fc3991c772a8bad

  • SHA256

    10872da68ef042b6c9dfaacfd15b00dee1b0e8b75c7d425d9c7dc67699eca8fa

  • SHA512

    2f3013840f20f7df370c22e0eb7dc8eca26d05cf1fc71f0c40a13b99ce8479da91b2fb538cd43037c584fd859fee8ff7bdfdcae1f9153f8991229e28dc3c1547

  • SSDEEP

    196608:91Ohz7Pw34+wBuSrdMyWh6pwFy5OW7rcG/DO4kX/:3OJmhQdTEooW3V2P

Malware Config

Targets

    • Target

      10872da68ef042b6c9dfaacfd15b00dee1b0e8b75c7d425d9c7dc67699eca8fa.exe

    • Size

      7.2MB

    • MD5

      6f668dfb8128b5a5b4f329dea7458fac

    • SHA1

      3e44c697516f76b275a297213fc3991c772a8bad

    • SHA256

      10872da68ef042b6c9dfaacfd15b00dee1b0e8b75c7d425d9c7dc67699eca8fa

    • SHA512

      2f3013840f20f7df370c22e0eb7dc8eca26d05cf1fc71f0c40a13b99ce8479da91b2fb538cd43037c584fd859fee8ff7bdfdcae1f9153f8991229e28dc3c1547

    • SSDEEP

      196608:91Ohz7Pw34+wBuSrdMyWh6pwFy5OW7rcG/DO4kX/:3OJmhQdTEooW3V2P

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks