General

  • Target

    invoice.zip

  • Size

    445KB

  • Sample

    231011-l2tc1sff9t

  • MD5

    e2662cf78f53a993a8150b23817f4d72

  • SHA1

    86342ed12e40d31f51119dc2ba0c64906debe2c3

  • SHA256

    0a5169e4e748c08c58271bb1c2533ea1a7ff292d166e8ff0df7fc8c9391ff6c3

  • SHA512

    6afd945e55b55af9437420d00077223fce3be950eeac66fd4a316bfb51220e5246b2c9b99d475a33e7f7c1961c75fd6fac574655c0bb56695032d0b125845e31

  • SSDEEP

    6144:DnLIxssuFzcW+Ofmt8q4FGhaZ3zfSGgRy917WwC6POFZQ6w/8HRgZ4Y83QsGJyof:fOssuFzcTOaDLMX7BC6dKyx2fbs

Malware Config

Targets

    • Target

      invoice.exe

    • Size

      547KB

    • MD5

      2871c84f7b9f2d499d594ab117841d92

    • SHA1

      c5487083bed67725d866b98f4464191ff2a82fbe

    • SHA256

      445e78195ac6fda213fe26c8263f5362d0f3f61ff4d5f11e9c1293298a1b422f

    • SHA512

      4ddf3f75ff4799a619ca29eccd8665b1094b88d14763e89e5747dbf458af28bc60261118311f3cb0486328c028dde626de329cb4fb0e3536d255a81bf0e539bd

    • SSDEEP

      12288:x07+Uw8vMMMDMMMXXcVOajBMN1BM250oQCU2:AvMMMDMMMXXqOampdKCF

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks