General

  • Target

    0e4c56f4cd23e8d4ac1a7066ad4dc691_JC.exe

  • Size

    228KB

  • Sample

    231011-g43bgsgh42

  • MD5

    0e4c56f4cd23e8d4ac1a7066ad4dc691

  • SHA1

    3c4a689cd8fe1023a3d4bfc5caceb4d6e65943fa

  • SHA256

    e96ca9869d5c99528733e88cedfd1031a0a09484b4007fb9272e235356a976fe

  • SHA512

    1ac0364b46f85b05bca64115d678e4479961b6d4060c4ddd0fb8e497d59bb22d63a84926de4a70c3d50578a47a254225c7ee7f1c07b0c5cdde0362b68da8d350

  • SSDEEP

    3072:t/jbLl/gvQoutg+wuvImsiBOqI5o+1E/wU+9VO4dhhhz+rDKUGc+Gm9JAMlpknHp:VjluQoS5wumaNI5JUa3jhnUIhUBf

Malware Config

Targets

    • Target

      0e4c56f4cd23e8d4ac1a7066ad4dc691_JC.exe

    • Size

      228KB

    • MD5

      0e4c56f4cd23e8d4ac1a7066ad4dc691

    • SHA1

      3c4a689cd8fe1023a3d4bfc5caceb4d6e65943fa

    • SHA256

      e96ca9869d5c99528733e88cedfd1031a0a09484b4007fb9272e235356a976fe

    • SHA512

      1ac0364b46f85b05bca64115d678e4479961b6d4060c4ddd0fb8e497d59bb22d63a84926de4a70c3d50578a47a254225c7ee7f1c07b0c5cdde0362b68da8d350

    • SSDEEP

      3072:t/jbLl/gvQoutg+wuvImsiBOqI5o+1E/wU+9VO4dhhhz+rDKUGc+Gm9JAMlpknHp:VjluQoS5wumaNI5JUa3jhnUIhUBf

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks