General

  • Target

    Build-5064047735-69594.cert

  • Size

    793KB

  • Sample

    230102-xwb3bsff49

  • MD5

    be1c30feca41f897c83974288b591f9a

  • SHA1

    82ca8fb9b994f8c99a6156e14057f4e5eab2a025

  • SHA256

    b57943849425f3f3a4cc66192d47a1f15900c627f4bad7da4280ad72da553b8c

  • SHA512

    4e6b87a008dc822c3671a258c92b9aef511a017137d5a6e7cf5db78d96eaec3e19643b69ee4249958b2fa0c4e2c1d0174dc659feb102cdfb5ad0ee41fc7a6557

  • SSDEEP

    24576:hLAt3ieGOGoNOcfLtAz2QFPlePWBoy2Ij:te/VNLFIAPxdY

Malware Config

Targets

    • Target

      Build-5064047735-69594.cert

    • Size

      793KB

    • MD5

      be1c30feca41f897c83974288b591f9a

    • SHA1

      82ca8fb9b994f8c99a6156e14057f4e5eab2a025

    • SHA256

      b57943849425f3f3a4cc66192d47a1f15900c627f4bad7da4280ad72da553b8c

    • SHA512

      4e6b87a008dc822c3671a258c92b9aef511a017137d5a6e7cf5db78d96eaec3e19643b69ee4249958b2fa0c4e2c1d0174dc659feb102cdfb5ad0ee41fc7a6557

    • SSDEEP

      24576:hLAt3ieGOGoNOcfLtAz2QFPlePWBoy2Ij:te/VNLFIAPxdY

    • Detectes Phoenix Miner Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks