General

  • Target

    b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2

  • Size

    2.4MB

  • Sample

    221206-l87tzsgf53

  • MD5

    528b642e1ce1b2689d469b59fe2e8e41

  • SHA1

    69f410bdc9764f7cf925687c7daaf01ce6d47b33

  • SHA256

    b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2

  • SHA512

    8b1bc1a86a2ad8dae6f7e8e95085b4f873b571c921af471dadafc397da67b192487beb0fb03232063ea8fd0627abc21c30152579dcf4dad4c5690703e4746502

  • SSDEEP

    49152:JCR7FGaQDrygJFV7L20Qw1TdVXQKVJEIyDkMzIjWiCNRdqMMgVeu:J07FBQDWg7VP2Xw9dhJCkMGURdq+eu

Score
8/10

Malware Config

Targets

    • Target

      b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2

    • Size

      2.4MB

    • MD5

      528b642e1ce1b2689d469b59fe2e8e41

    • SHA1

      69f410bdc9764f7cf925687c7daaf01ce6d47b33

    • SHA256

      b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2

    • SHA512

      8b1bc1a86a2ad8dae6f7e8e95085b4f873b571c921af471dadafc397da67b192487beb0fb03232063ea8fd0627abc21c30152579dcf4dad4c5690703e4746502

    • SSDEEP

      49152:JCR7FGaQDrygJFV7L20Qw1TdVXQKVJEIyDkMzIjWiCNRdqMMgVeu:J07FBQDWg7VP2Xw9dhJCkMGURdq+eu

    Score
    8/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks