General

  • Target

    file.exe

  • Size

    410KB

  • Sample

    230519-qcmw6aea49

  • MD5

    e80264156b7c26f7495709faa23ffdb7

  • SHA1

    5d497c936ee71cc18125793bba524e4832a10789

  • SHA256

    aa4bbc0296b28232d20ca66e74e55dea3f82ca212db912fbc0825c93403654a9

  • SHA512

    697c7d64c1b8f07cede094aa6ace876dd9d3eac3c634036764eb464196e8a41ce3d93ff878d9e6b2cb0a5ea35a93aa123f75463f1571b38acd7e53ee1e4c5ec8

  • SSDEEP

    12288:9+cpD7KsRbSQ82gxVB5mSNDtdLCXZC/QuQ/g+LjQRohyqBoHCK0iOEfoh4c3QCNo:HpD0b

Malware Config

Targets

    • Target

      file.exe

    • Size

      410KB

    • MD5

      e80264156b7c26f7495709faa23ffdb7

    • SHA1

      5d497c936ee71cc18125793bba524e4832a10789

    • SHA256

      aa4bbc0296b28232d20ca66e74e55dea3f82ca212db912fbc0825c93403654a9

    • SHA512

      697c7d64c1b8f07cede094aa6ace876dd9d3eac3c634036764eb464196e8a41ce3d93ff878d9e6b2cb0a5ea35a93aa123f75463f1571b38acd7e53ee1e4c5ec8

    • SSDEEP

      12288:9+cpD7KsRbSQ82gxVB5mSNDtdLCXZC/QuQ/g+LjQRohyqBoHCK0iOEfoh4c3QCNo:HpD0b

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks