General

  • Target

    rosdy.txt

  • Size

    347B

  • Sample

    230331-yk13rach96

  • MD5

    f2a113e9f33c868ac0302d06f87152a8

  • SHA1

    6446dbeec6453a3d763a93f55d9ecddd7e6ba072

  • SHA256

    59dc8c6bf55e999c7a3e0429ca14025d41a1bba1eaba80a0c8d6db59402de03b

  • SHA512

    2a29cbebf48967ce94f2225347d604c184cb1c2575e78c5eca30beb533553ea798c065da2405800cb325f053ba3254a593f83268ea9224695fea51c9cb9881f8

Malware Config

Targets

    • Target

      rosdy.txt

    • Size

      347B

    • MD5

      f2a113e9f33c868ac0302d06f87152a8

    • SHA1

      6446dbeec6453a3d763a93f55d9ecddd7e6ba072

    • SHA256

      59dc8c6bf55e999c7a3e0429ca14025d41a1bba1eaba80a0c8d6db59402de03b

    • SHA512

      2a29cbebf48967ce94f2225347d604c184cb1c2575e78c5eca30beb533553ea798c065da2405800cb325f053ba3254a593f83268ea9224695fea51c9cb9881f8

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Tasks