General

  • Target

    shipping documents.zip

  • Size

    445KB

  • Sample

    231011-pak44sga82

  • MD5

    311812b4d3628fa5130f55c96376f62c

  • SHA1

    e591f399d6226328ae2f746f7d0f30cc59bde4b6

  • SHA256

    65fe2b7da59b7acec2486a479f8e09e2e1849d449961dd02ad9101eef5123b91

  • SHA512

    99af4b556adea69de4b26e6fb53398bea29596e820f0b7010197c111a2a0c9db28420d9edb60fff3a09b7e035d9539f8ab3fa0132f0c3832a44702be996f20af

  • SSDEEP

    6144:5nLIxssuFzcW+Ofmt8q4FGhaZ3zfSGgRy917WwC6POFZQ6w/8HRgZ4Y83QsGJyoZ:9OssuFzcTOaDLMX7BC6dKyx2fbs

Malware Config

Targets

    • Target

      shipping documents.exe

    • Size

      547KB

    • MD5

      2871c84f7b9f2d499d594ab117841d92

    • SHA1

      c5487083bed67725d866b98f4464191ff2a82fbe

    • SHA256

      445e78195ac6fda213fe26c8263f5362d0f3f61ff4d5f11e9c1293298a1b422f

    • SHA512

      4ddf3f75ff4799a619ca29eccd8665b1094b88d14763e89e5747dbf458af28bc60261118311f3cb0486328c028dde626de329cb4fb0e3536d255a81bf0e539bd

    • SSDEEP

      12288:x07+Uw8vMMMDMMMXXcVOajBMN1BM250oQCU2:AvMMMDMMMXXqOampdKCF

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks