General

  • Target

    python-3.10.9-amd64.exe

  • Size

    27.6MB

  • Sample

    230511-v9jcfsbb5s

  • MD5

    dce578fe177892488cadb6c34aea58ee

  • SHA1

    e562807ddd0bc8366d936ce72684ce2b6630e297

  • SHA256

    b8c707fb7a3a80f49af5a51c94f428525a3ad4331c7b9e3b2e321caf5cb56d7d

  • SHA512

    8858aa7e82ca8cf559eeb25c14d86d24637a86e64c8db7465c99d05558ce3c67cea18d68abdfbe3df08cdbedfca5f819aa7fd8e57beae2054a7f7a8a64c04b41

  • SSDEEP

    393216:rLQzCSAmQThdbDLP4+pG+ynEuB2EdPJPSmZ7SCZtnfhk1pACJ+DH5dTLwUTmhU+3:rqCLPxpG+tRKPJPSu7rkphcDnwhC7i

Malware Config

Targets

    • Target

      python-3.10.9-amd64.exe

    • Size

      27.6MB

    • MD5

      dce578fe177892488cadb6c34aea58ee

    • SHA1

      e562807ddd0bc8366d936ce72684ce2b6630e297

    • SHA256

      b8c707fb7a3a80f49af5a51c94f428525a3ad4331c7b9e3b2e321caf5cb56d7d

    • SHA512

      8858aa7e82ca8cf559eeb25c14d86d24637a86e64c8db7465c99d05558ce3c67cea18d68abdfbe3df08cdbedfca5f819aa7fd8e57beae2054a7f7a8a64c04b41

    • SSDEEP

      393216:rLQzCSAmQThdbDLP4+pG+ynEuB2EdPJPSmZ7SCZtnfhk1pACJ+DH5dTLwUTmhU+3:rqCLPxpG+tRKPJPSu7rkphcDnwhC7i

    • Blocklisted process makes network request

    • Adds Run key to start application

    • Drops Chrome extension

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v6

Tasks