General

  • Target

    ee.txt

  • Size

    1KB

  • Sample

    230331-y5fybaee3t

  • MD5

    ace7bd3affd59dd49bf63767a1302f3c

  • SHA1

    0eb30e9a51cb4440bbbdd64f477b22ac80d828b2

  • SHA256

    208112cd695bcdb7302c6f4ee7648e3a91b8b25940d6ca41e1c30189baf33552

  • SHA512

    cee205ef9f47ecb24832909e4d892db58108a138b5d13d3ea508b4c764bc27b9e111b35e0d0fe2a78dd9c23934586284a460978a4a728ca42e1f7f394ee92e17

Malware Config

Targets

    • Target

      ee.txt

    • Size

      1KB

    • MD5

      ace7bd3affd59dd49bf63767a1302f3c

    • SHA1

      0eb30e9a51cb4440bbbdd64f477b22ac80d828b2

    • SHA256

      208112cd695bcdb7302c6f4ee7648e3a91b8b25940d6ca41e1c30189baf33552

    • SHA512

      cee205ef9f47ecb24832909e4d892db58108a138b5d13d3ea508b4c764bc27b9e111b35e0d0fe2a78dd9c23934586284a460978a4a728ca42e1f7f394ee92e17

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Tasks