General

  • Target

    b11bf4550bfa297fd2b2ee7e554323808eef3ce2ee7bceca11d61a1618f5a04f

  • Size

    1.3MB

  • Sample

    221207-dygk2sbb99

  • MD5

    f19da7ae375a414349944b6e511028ad

  • SHA1

    978453c66fb51fcfd78818f29b27fa4cb480207f

  • SHA256

    b11bf4550bfa297fd2b2ee7e554323808eef3ce2ee7bceca11d61a1618f5a04f

  • SHA512

    991efb9a066b626d9513d9e343d27227104d8d4d51f55e378f53be19c0186c32df957b5cb1f44614d1fbdb9a1bff7f6e713e9ae40e0bcd60675bddb29eb2b992

  • SSDEEP

    24576:F0jX30a+oaIF/MDb76OmcR0zRuo1Be4rjUCao8T:F0jX30XHIF0DTmcR0zRuoHsC4

Malware Config

Targets

    • Target

      b11bf4550bfa297fd2b2ee7e554323808eef3ce2ee7bceca11d61a1618f5a04f

    • Size

      1.3MB

    • MD5

      f19da7ae375a414349944b6e511028ad

    • SHA1

      978453c66fb51fcfd78818f29b27fa4cb480207f

    • SHA256

      b11bf4550bfa297fd2b2ee7e554323808eef3ce2ee7bceca11d61a1618f5a04f

    • SHA512

      991efb9a066b626d9513d9e343d27227104d8d4d51f55e378f53be19c0186c32df957b5cb1f44614d1fbdb9a1bff7f6e713e9ae40e0bcd60675bddb29eb2b992

    • SSDEEP

      24576:F0jX30a+oaIF/MDb76OmcR0zRuo1Be4rjUCao8T:F0jX30XHIF0DTmcR0zRuoHsC4

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks