General

  • Target

    24a4039692a2d0baa28bf7ee0456f82c.bin

  • Size

    1.0MB

  • Sample

    230610-bh1ymsdh46

  • MD5

    24a4039692a2d0baa28bf7ee0456f82c

  • SHA1

    8b43fc96bc9bf12ab8fcf4cac1e7c1f20be4a6f2

  • SHA256

    f0c3c67d1099fb21019694585646996f465eae28006dc248c0adfeac1e8fe189

  • SHA512

    bb8a89aaac6cebaf5a2a9bde42436794eb6bc912da7d9007c73c1783c917ff0b37c217e0d2c66b4043f923c4e10b21a4c39abbe495d45faab5990c058778a023

  • SSDEEP

    24576:WBpJi6LbUjebhV8kk/DWgHX5BD6PhyONxWqnCsEyA:S7vYiP6S0D6PhywxbXEl

Malware Config

Targets

    • Target

      24a4039692a2d0baa28bf7ee0456f82c.bin

    • Size

      1.0MB

    • MD5

      24a4039692a2d0baa28bf7ee0456f82c

    • SHA1

      8b43fc96bc9bf12ab8fcf4cac1e7c1f20be4a6f2

    • SHA256

      f0c3c67d1099fb21019694585646996f465eae28006dc248c0adfeac1e8fe189

    • SHA512

      bb8a89aaac6cebaf5a2a9bde42436794eb6bc912da7d9007c73c1783c917ff0b37c217e0d2c66b4043f923c4e10b21a4c39abbe495d45faab5990c058778a023

    • SSDEEP

      24576:WBpJi6LbUjebhV8kk/DWgHX5BD6PhyONxWqnCsEyA:S7vYiP6S0D6PhywxbXEl

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks