General

  • Target

    spsetup132.exe

  • Size

    8.6MB

  • Sample

    230222-tkegjace42

  • MD5

    2e57838af780fba75f9085a67cde99e4

  • SHA1

    8070b4e5c50a4a981f6dcf78ffd424c065182b09

  • SHA256

    0a9e739910578192e2ad3f8f805a863d5cbcacbc38cde6488d7bbef5395dba87

  • SHA512

    84d58581d306c568db4ce572c509f69751932fe9293218f531e4d92951dd7d804756aeca8ede459c0a634e6f140fd9455693955325739657b5699d5d48d0ce63

  • SSDEEP

    196608:FuYr1j0wlfy/tycs/bZ6ctLCyoZcmtZs47ctad+UK7HZDLtHw57I:FuYr5ik/TtLCfXOad+/ZHs7I

Malware Config

Targets

    • Target

      spsetup132.exe

    • Size

      8.6MB

    • MD5

      2e57838af780fba75f9085a67cde99e4

    • SHA1

      8070b4e5c50a4a981f6dcf78ffd424c065182b09

    • SHA256

      0a9e739910578192e2ad3f8f805a863d5cbcacbc38cde6488d7bbef5395dba87

    • SHA512

      84d58581d306c568db4ce572c509f69751932fe9293218f531e4d92951dd7d804756aeca8ede459c0a634e6f140fd9455693955325739657b5699d5d48d0ce63

    • SSDEEP

      196608:FuYr1j0wlfy/tycs/bZ6ctLCyoZcmtZs47ctad+UK7HZDLtHw57I:FuYr5ik/TtLCfXOad+/ZHs7I

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks