General

  • Target

    S1gma Stealer.exe

  • Size

    5.6MB

  • Sample

    230411-l3zlesdd8v

  • MD5

    7d84b20860accbf77493596450f92276

  • SHA1

    a438dd2a447af58d265a3b2fa092151745d4851c

  • SHA256

    f73a2657091c0e9834c3a17bc5534844e8e0eaaeaacc8aa42992cb1bb62cec8b

  • SHA512

    a75cfa4801dc9cbb1dde7bf565dcdc01dc82d97f81f8bfbdb9117c29bcb2de302e790d04ef5612fd0a08c69dfa795e9767fcc1235cd05d674870e1dab6efae60

  • SSDEEP

    98304:8W8C8jjkI6ML8tKCAglYYP3YLr8ZNBDo+IXl2QjewHbYf1sGoJMjfxzhUu8/KnfF:8Wr8SMKGYPoLAZNtIX5ezUMlVzb

Malware Config

Targets

    • Target

      S1gma Stealer.exe

    • Size

      5.6MB

    • MD5

      7d84b20860accbf77493596450f92276

    • SHA1

      a438dd2a447af58d265a3b2fa092151745d4851c

    • SHA256

      f73a2657091c0e9834c3a17bc5534844e8e0eaaeaacc8aa42992cb1bb62cec8b

    • SHA512

      a75cfa4801dc9cbb1dde7bf565dcdc01dc82d97f81f8bfbdb9117c29bcb2de302e790d04ef5612fd0a08c69dfa795e9767fcc1235cd05d674870e1dab6efae60

    • SSDEEP

      98304:8W8C8jjkI6ML8tKCAglYYP3YLr8ZNBDo+IXl2QjewHbYf1sGoJMjfxzhUu8/KnfF:8Wr8SMKGYPoLAZNtIX5ezUMlVzb

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks