General

  • Target

    tmp

  • Size

    2.8MB

  • Sample

    230315-rl9mysff6w

  • MD5

    c8d0a1683a5446ccde142003418289ac

  • SHA1

    0c23236f995015e153efec0b02fb8c3e777f3088

  • SHA256

    1704307c4598fa8ec273bacaaaa2dfb24ac7e89dde8fd02a3e87b9f55fcdf9b6

  • SHA512

    c691ec211fe2e557a087f02ffe592509f53e31520599b5d596c019cff1d76745e3fd0d84b3025e04beed99642fab069d38d8047ae4ab32ebcf99c35b79afdd54

  • SSDEEP

    49152:mxQxMl2s1gZg+gh9bOpmfCoXEpOFlTJ8I37p8Okt9S:

Malware Config

Targets

    • Target

      tmp

    • Size

      2.8MB

    • MD5

      c8d0a1683a5446ccde142003418289ac

    • SHA1

      0c23236f995015e153efec0b02fb8c3e777f3088

    • SHA256

      1704307c4598fa8ec273bacaaaa2dfb24ac7e89dde8fd02a3e87b9f55fcdf9b6

    • SHA512

      c691ec211fe2e557a087f02ffe592509f53e31520599b5d596c019cff1d76745e3fd0d84b3025e04beed99642fab069d38d8047ae4ab32ebcf99c35b79afdd54

    • SSDEEP

      49152:mxQxMl2s1gZg+gh9bOpmfCoXEpOFlTJ8I37p8Okt9S:

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks