General

  • Target

    1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe

  • Size

    5.6MB

  • Sample

    221230-yrlxeabf8z

  • MD5

    874e46be108952c842a12c0e19a64f34

  • SHA1

    7ca7e05b6c79bb32b2278b2a688b062fa94c3307

  • SHA256

    1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe

  • SHA512

    e3f22582d592ce8791de1825abf30fbcfa209685ed07b38c390ac2e6b9a0ba8314c1b8377c6c02413b90b68abd2949a29163a570ee5da8a7b9139f37b25a56e3

  • SSDEEP

    98304:oQIKTOArAetVg4jpptVbo5BkrTWZ5OHqY5n95WXDJsks6ofoGvB7wMX5E6p:oQIIOAjg4NptgyWZ5OTD5Etsl1vpwUEU

Malware Config

Targets

    • Target

      1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe

    • Size

      5.6MB

    • MD5

      874e46be108952c842a12c0e19a64f34

    • SHA1

      7ca7e05b6c79bb32b2278b2a688b062fa94c3307

    • SHA256

      1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe

    • SHA512

      e3f22582d592ce8791de1825abf30fbcfa209685ed07b38c390ac2e6b9a0ba8314c1b8377c6c02413b90b68abd2949a29163a570ee5da8a7b9139f37b25a56e3

    • SSDEEP

      98304:oQIKTOArAetVg4jpptVbo5BkrTWZ5OHqY5n95WXDJsks6ofoGvB7wMX5E6p:oQIIOAjg4NptgyWZ5OTD5Etsl1vpwUEU

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks