General

  • Target

    setup.exe

  • Size

    731KB

  • Sample

    230610-bstmbadh77

  • MD5

    963fd9d32269be9ab784192f6e306657

  • SHA1

    59f213a6b876cce5a2857ac21b30c04609fc5023

  • SHA256

    8efa4cf470432f23e1c3055e98f2b5b0d3459aa576ef7a9e46bf5b89c8a0a7ba

  • SHA512

    97ccc0ed98a0914122de6c586a0e3b05157761c27d9752fcf7a5d5e472b6af3371a66c5bfbd1d5a0f288e2d50911dab098681cfde2aa85e796ca17cdaa53fc9b

  • SSDEEP

    12288:oFLIbiTShdX/O3lvK9Xbg21o0eMb01JQntLOCbDa8gWh7XM:o5uiTShJ/O3v2G0embm8Pd8

Malware Config

Targets

    • Target

      setup.exe

    • Size

      731KB

    • MD5

      963fd9d32269be9ab784192f6e306657

    • SHA1

      59f213a6b876cce5a2857ac21b30c04609fc5023

    • SHA256

      8efa4cf470432f23e1c3055e98f2b5b0d3459aa576ef7a9e46bf5b89c8a0a7ba

    • SHA512

      97ccc0ed98a0914122de6c586a0e3b05157761c27d9752fcf7a5d5e472b6af3371a66c5bfbd1d5a0f288e2d50911dab098681cfde2aa85e796ca17cdaa53fc9b

    • SSDEEP

      12288:oFLIbiTShdX/O3lvK9Xbg21o0eMb01JQntLOCbDa8gWh7XM:o5uiTShJ/O3v2G0embm8Pd8

    • Contacts a large (4257) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Network Service Scanning

2
T1046

Query Registry

5
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks