General

  • Target

    file.exe

  • Size

    196KB

  • Sample

    230209-qlm9aade65

  • MD5

    bab7ff0ab1f1c0eb256aca9bb02bb335

  • SHA1

    6fa412098d675d481d450a62d4c98e0be0eea152

  • SHA256

    e00872baaf3dbfc561cdd5d4b71d9e37a900bee0871c7f7ecf3b7f1ff42c5582

  • SHA512

    f0a857b73ba003263441c7f1d626c0820084d8572d4894bbec40f34f6358fdcd3103d39426371c67df784126267adba8b81f7d44e2d7a24cca43839c69c9c57b

  • SSDEEP

    3072:8JJOWTxKujYgLuYxqbW8U5tLh3TJ3FvsJyxYtFmeoKV6MQns6ECr:8JJbHRLu3bgWExYK9lJsLC

Malware Config

Targets

    • Target

      file.exe

    • Size

      196KB

    • MD5

      bab7ff0ab1f1c0eb256aca9bb02bb335

    • SHA1

      6fa412098d675d481d450a62d4c98e0be0eea152

    • SHA256

      e00872baaf3dbfc561cdd5d4b71d9e37a900bee0871c7f7ecf3b7f1ff42c5582

    • SHA512

      f0a857b73ba003263441c7f1d626c0820084d8572d4894bbec40f34f6358fdcd3103d39426371c67df784126267adba8b81f7d44e2d7a24cca43839c69c9c57b

    • SSDEEP

      3072:8JJOWTxKujYgLuYxqbW8U5tLh3TJ3FvsJyxYtFmeoKV6MQns6ECr:8JJbHRLu3bgWExYK9lJsLC

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks