General

  • Target

    SOA.exe

  • Size

    1.0MB

  • Sample

    230115-pgln8aad8y

  • MD5

    fb0950bf9032fec787bb207fb301f241

  • SHA1

    d1f7e856010549dec73aec6129ce98623c5d6cb9

  • SHA256

    11b9f67eb281cdf13dae80e0e6b549755355ffe3774a0ee63f902adf522615c3

  • SHA512

    595a485c2331f62ee2f3e2b053b29594404e659b91bf268aac7519d5db790ad0d0f1dd9a2eab610673f1c77081b568b1c1636984eebd019d1a109b3f2b4ea4ac

  • SSDEEP

    24576:C/pk1/tX0BhzdbPF/pqZT+w8oDyV1WVTCOi9KeV:C/pQ8hzdXqZT4V1Gi9Ke

Malware Config

Targets

    • Target

      SOA.exe

    • Size

      1.0MB

    • MD5

      fb0950bf9032fec787bb207fb301f241

    • SHA1

      d1f7e856010549dec73aec6129ce98623c5d6cb9

    • SHA256

      11b9f67eb281cdf13dae80e0e6b549755355ffe3774a0ee63f902adf522615c3

    • SHA512

      595a485c2331f62ee2f3e2b053b29594404e659b91bf268aac7519d5db790ad0d0f1dd9a2eab610673f1c77081b568b1c1636984eebd019d1a109b3f2b4ea4ac

    • SSDEEP

      24576:C/pk1/tX0BhzdbPF/pqZT+w8oDyV1WVTCOi9KeV:C/pQ8hzdXqZT4V1Gi9Ke

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks