General

  • Target

    E-dekont.exe

  • Size

    428KB

  • Sample

    230918-cp5e3sec3t

  • MD5

    cb800e295dd3a1d9d4342296e6b62566

  • SHA1

    7a12ada177664103b7bbe12ec6c225687a94cd0c

  • SHA256

    d72f069d0741d1a70f91c31c9994bb75c2f7ffc00d8d6af985a04b0bcc0ea614

  • SHA512

    e87726ea0b52c0277a9d00b44ba0fab92dcae4f1e13b9597f1b5801a44db388c3088e925ece72af3e448026f3630d63fa727f1875fab8e56bf6c36c755c2a806

  • SSDEEP

    6144:xB+pgUvsgje7IL7WxoaDWcZlHa/HQpEHK87Uq5shwMtZk1Ttxvs7bScsQ09TZysA:xgnN+47ZkrkHjHX3sttsvMG9TZyr

Malware Config

Targets

    • Target

      E-dekont.exe

    • Size

      428KB

    • MD5

      cb800e295dd3a1d9d4342296e6b62566

    • SHA1

      7a12ada177664103b7bbe12ec6c225687a94cd0c

    • SHA256

      d72f069d0741d1a70f91c31c9994bb75c2f7ffc00d8d6af985a04b0bcc0ea614

    • SHA512

      e87726ea0b52c0277a9d00b44ba0fab92dcae4f1e13b9597f1b5801a44db388c3088e925ece72af3e448026f3630d63fa727f1875fab8e56bf6c36c755c2a806

    • SSDEEP

      6144:xB+pgUvsgje7IL7WxoaDWcZlHa/HQpEHK87Uq5shwMtZk1Ttxvs7bScsQ09TZysA:xgnN+47ZkrkHjHX3sttsvMG9TZyr

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks