Resubmissions

30/09/2023, 18:51

230930-xhw6caeg6z 9

30/09/2023, 18:38

230930-w95q5agb99 9

General

  • Target

    a135d639735d9b6123b3960017ad3c2ce6b15346481b70b771d52c7aed17d35b.zip

  • Size

    364KB

  • Sample

    230930-w95q5agb99

  • MD5

    5bba0cfeb77901c569c33fd5b7d0cad3

  • SHA1

    5a1efd8931f7a37e188d495ed4fd0f2d2feaadef

  • SHA256

    96db66e9a66996393b4f50a28edfb3f9e6c87d869418d431c7fa7e0e42073cde

  • SHA512

    b469b01d9cd35588c6a951fd9e15b9281b555088907e97ff636299da9166529c1d117ab1b3c7cd327e2be0f67a9342cac4c2ca7d0536cd7212e47b5da45fec0e

  • SSDEEP

    6144:9Xrk9vSaqwBcGy6Lm2JoxWBzyTc5cd2mDYSaBV5plg1Xb14tG1iJ6do:18owtK2JoxWVZcdZYXBD/g1Xb1nMJ6C

Malware Config

Targets

    • Target

      a135d639735d9b6123b3960017ad3c2ce6b15346481b70b771d52c7aed17d35b.zip

    • Size

      364KB

    • MD5

      5bba0cfeb77901c569c33fd5b7d0cad3

    • SHA1

      5a1efd8931f7a37e188d495ed4fd0f2d2feaadef

    • SHA256

      96db66e9a66996393b4f50a28edfb3f9e6c87d869418d431c7fa7e0e42073cde

    • SHA512

      b469b01d9cd35588c6a951fd9e15b9281b555088907e97ff636299da9166529c1d117ab1b3c7cd327e2be0f67a9342cac4c2ca7d0536cd7212e47b5da45fec0e

    • SSDEEP

      6144:9Xrk9vSaqwBcGy6Lm2JoxWBzyTc5cd2mDYSaBV5plg1Xb14tG1iJ6do:18owtK2JoxWVZcdZYXBD/g1Xb1nMJ6C

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Creates new service(s)

    • Downloads MZ/PE file

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks