General

  • Target

    TLauncher.lnk

  • Size

    1KB

  • Sample

    230206-y4qq5aba4w

  • MD5

    d857b472e0e44470f3a6476a340559b5

  • SHA1

    ef3096f7619f4b35afeba3d325e2bd4fd5dc5065

  • SHA256

    e34014b3eab2272cdcd65c897d669a4156cb4937a4f558c022a33cadb7baeb56

  • SHA512

    33a7844d85726489cb1626e5790c925305b8676e1a6362418f1b55503e0f0a9b5e8862b1c5067648e1f499dc08d5f943891c4be9dd50dad1083727bc4feb8153

Malware Config

Targets

    • Target

      TLauncher.lnk

    • Size

      1KB

    • MD5

      d857b472e0e44470f3a6476a340559b5

    • SHA1

      ef3096f7619f4b35afeba3d325e2bd4fd5dc5065

    • SHA256

      e34014b3eab2272cdcd65c897d669a4156cb4937a4f558c022a33cadb7baeb56

    • SHA512

      33a7844d85726489cb1626e5790c925305b8676e1a6362418f1b55503e0f0a9b5e8862b1c5067648e1f499dc08d5f943891c4be9dd50dad1083727bc4feb8153

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks