General

  • Target

    Format Factory 4.3.0.0.exe

  • Size

    51.7MB

  • Sample

    230205-dez82sga34

  • MD5

    3fccb72d5c0a55a8ffacb8477621a354

  • SHA1

    898a54544b9aa00f21a41e1faa1985ebf1416859

  • SHA256

    c135ed6d5a787840884e0d2e63a9dc8512d854af0d3442dbe1eaf0eb015044d6

  • SHA512

    38598d58f2c8818535c1d480b71d4e7e067f0b59b0acf0cc651c67c799dd6573115f0cd8dd53a2484845e6b07fce9e721371877b43a3a4ff409ec97b17066cdd

  • SSDEEP

    1572864:z8c4ix/84ZH7XIQiBv7UucL32JTBeAt/DVuXgm0QRb:CckYH74QaUxGFBjD/i

Malware Config

Targets

    • Target

      Format Factory 4.3.0.0.exe

    • Size

      51.7MB

    • MD5

      3fccb72d5c0a55a8ffacb8477621a354

    • SHA1

      898a54544b9aa00f21a41e1faa1985ebf1416859

    • SHA256

      c135ed6d5a787840884e0d2e63a9dc8512d854af0d3442dbe1eaf0eb015044d6

    • SHA512

      38598d58f2c8818535c1d480b71d4e7e067f0b59b0acf0cc651c67c799dd6573115f0cd8dd53a2484845e6b07fce9e721371877b43a3a4ff409ec97b17066cdd

    • SSDEEP

      1572864:z8c4ix/84ZH7XIQiBv7UucL32JTBeAt/DVuXgm0QRb:CckYH74QaUxGFBjD/i

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks