General

  • Target

    00d3d0c49343dba533737e4a17cf453697aa569b00d07deb2cd7688c66d88ada.bin

  • Size

    266KB

  • Sample

    230430-2d11ysed28

  • MD5

    bf06b230800b247480122519febf9b1b

  • SHA1

    39131291b747c87b25ac36b8d9c27afe55d3b628

  • SHA256

    00d3d0c49343dba533737e4a17cf453697aa569b00d07deb2cd7688c66d88ada

  • SHA512

    23d7a29fa3687bf767fbfef227f3e55fb08652822a957bbfe7a95cb9246f73a74fa936c9f78a8b6118b25bccb75ebebb0ea680d5594c72907811bb24e6acf7de

  • SSDEEP

    6144:PYa6xF99EDoKzKKslaPQsZbfSr+URvU+31XtD71erCXy4pRGjspnY2E2:PYT/eDoJJsZbfSl93Rxzy4pRj1FV

Score
8/10

Malware Config

Targets

    • Target

      00d3d0c49343dba533737e4a17cf453697aa569b00d07deb2cd7688c66d88ada.bin

    • Size

      266KB

    • MD5

      bf06b230800b247480122519febf9b1b

    • SHA1

      39131291b747c87b25ac36b8d9c27afe55d3b628

    • SHA256

      00d3d0c49343dba533737e4a17cf453697aa569b00d07deb2cd7688c66d88ada

    • SHA512

      23d7a29fa3687bf767fbfef227f3e55fb08652822a957bbfe7a95cb9246f73a74fa936c9f78a8b6118b25bccb75ebebb0ea680d5594c72907811bb24e6acf7de

    • SSDEEP

      6144:PYa6xF99EDoKzKKslaPQsZbfSr+URvU+31XtD71erCXy4pRGjspnY2E2:PYT/eDoJJsZbfSl93Rxzy4pRj1FV

    Score
    8/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks