Resubmissions

01/02/2023, 11:23

230201-nhgafseh6t 9

01/02/2023, 11:12

230201-na5cbaeh2z 9

01/02/2023, 11:03

230201-m5srbseh2t 8

General

  • Target

    setup.exe

  • Size

    730KB

  • Sample

    230201-nhgafseh6t

  • MD5

    c4ee37d6ac1b44ca8232f37059d4578e

  • SHA1

    fc5830d9bc7bf12ce5a1c754874f3053ff1f079f

  • SHA256

    9b65d814b2b69ea8f455f57c649a9cd355acb04a0d27762af9e42548286fae37

  • SHA512

    199d9102e32a0ebb7fb0b278abb82807f8c7fec0d9ccb1c4b7798d7b57c6756f99a2a4288e95a25ed2aea4e5e0552a9f133e7439cc753f55538fed773cdaef83

  • SSDEEP

    12288:wFNIbiTShdX/O3lvK9Xbg21o0eMb01JQntLOCgla8gWh7X:wPuiTShJ/O3v2G0emgM8Pd

Malware Config

Targets

    • Target

      setup.exe

    • Size

      730KB

    • MD5

      c4ee37d6ac1b44ca8232f37059d4578e

    • SHA1

      fc5830d9bc7bf12ce5a1c754874f3053ff1f079f

    • SHA256

      9b65d814b2b69ea8f455f57c649a9cd355acb04a0d27762af9e42548286fae37

    • SHA512

      199d9102e32a0ebb7fb0b278abb82807f8c7fec0d9ccb1c4b7798d7b57c6756f99a2a4288e95a25ed2aea4e5e0552a9f133e7439cc753f55538fed773cdaef83

    • SSDEEP

      12288:wFNIbiTShdX/O3lvK9Xbg21o0eMb01JQntLOCgla8gWh7X:wPuiTShJ/O3v2G0emgM8Pd

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks