General

  • Target

    ff4c287c60ede1990442115bddd68201d25a735458f76786a938a0aa881d14ef.exe

  • Size

    17.3MB

  • Sample

    231012-hqfe8scg2w

  • MD5

    87aa5f3f514af2b9ef28db9f092f3249

  • SHA1

    20a2de20e662a5bc758808831ac35a6950c64474

  • SHA256

    ff4c287c60ede1990442115bddd68201d25a735458f76786a938a0aa881d14ef

  • SHA512

    58414a7ab8d0f0f687755e11b1acf7d91628ccf5596224538132a03c2ffce71d37927a9de4459957529e64ddb01672fbd3fc656399ea9b733d0337e50053dcf2

  • SSDEEP

    393216:eGCB+Xxfxn3Q6N696Ti0hMt9LR1b2wV7RYSWmfAFvGel+Ci:emxngz96W0i7DKwxRxQFvGew

Malware Config

Targets

    • Target

      ff4c287c60ede1990442115bddd68201d25a735458f76786a938a0aa881d14ef.exe

    • Size

      17.3MB

    • MD5

      87aa5f3f514af2b9ef28db9f092f3249

    • SHA1

      20a2de20e662a5bc758808831ac35a6950c64474

    • SHA256

      ff4c287c60ede1990442115bddd68201d25a735458f76786a938a0aa881d14ef

    • SHA512

      58414a7ab8d0f0f687755e11b1acf7d91628ccf5596224538132a03c2ffce71d37927a9de4459957529e64ddb01672fbd3fc656399ea9b733d0337e50053dcf2

    • SSDEEP

      393216:eGCB+Xxfxn3Q6N696Ti0hMt9LR1b2wV7RYSWmfAFvGel+Ci:emxngz96W0i7DKwxRxQFvGew

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks