General

  • Target

    MDE_File_Sample_ff39c56312090a909c2c0c82629c552a3b252a98.zip

  • Size

    1.1MB

  • Sample

    230118-ms49lafb79

  • MD5

    91e436afb31f60ba1b51e0bd3a02418e

  • SHA1

    cc4b20abdd923e2abbc785cd190b152a4d84c2ae

  • SHA256

    5c5acdae504bf7e3d8f2861aa2b19d4ae0ab93861a5fe028afa67800de46edd9

  • SHA512

    25dccec965dc2f8cf1e59ee9ed7ae2b08457ff32b67c9fbb55cf049fdc22a1ab2f4875e0af8ab91f7ae598d4196e4f14291d5497a402866157dd9cde23807e37

  • SSDEEP

    24576:BGFw+op0fPU9JUgq7k0d8VFkY/0+1x00mYZG2ojPaaFqgNTiTfdhVlEgOSx0qnuD:0Fw+00nU97q7k8Y/9+0B2blF90fdh7B8

Malware Config

Targets

    • Target

      draw-io_baM7W-1.exe

    • Size

      1.7MB

    • MD5

      99a9fbd5fee72ce51585309390a46717

    • SHA1

      ff39c56312090a909c2c0c82629c552a3b252a98

    • SHA256

      833064195b0c96bce9a8c00dc95df6bd9fce1092c1260ba0e877810bfc44b0aa

    • SHA512

      97f9a98fb48c8281818163d3dbe66fa246e1fe6a5a67f15175419992b0ca389cbe086e457177c21ce9c99ff05a1e0b508812cdf30220090a438dd8c94f73c6b7

    • SSDEEP

      24576:R4nXubIQGyxbPV0db26Wmd0l4sv1Et9uGpckT52zedlq89Ws5uIzk5aM/phdO7:Rqe3f61mZSffPMWrQ0ZkA

    • Modifies system executable filetype association

    • Creates new service(s)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Registers COM server for autorun

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Change Default File Association

1
T1042

New Service

1
T1050

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

New Service

1
T1050

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Security Software Discovery

1
T1063

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks