Resubmissions

30-10-2023 17:34

231030-v5qwqsgc33 7

30-10-2023 17:29

231030-v2swxsec7w 7

30-10-2023 17:08

231030-vnjfbsgb35 7

General

  • Target

    0d21084ba66020906561367b7fd3fc204065bcfdb56678e1396cb4d32df92b9b

  • Size

    8.3MB

  • Sample

    231030-vnjfbsgb35

  • MD5

    91b53026267ba8f38c21f8ab856648b4

  • SHA1

    ef13b28585a20e55bba284695e392e03362882d9

  • SHA256

    0d21084ba66020906561367b7fd3fc204065bcfdb56678e1396cb4d32df92b9b

  • SHA512

    d674938a2e93f3cfd9b35ad4a4685c943eb3078aa76ffe69b3e539bcd0923a1abbac1077b4e9e9af79ef3a8f43acf1f08363232a9506b3142d08180777b16c3a

  • SSDEEP

    196608:YqmEUkBfeZZwBj8r8DNIzhd61D+zHFclftIf55vUW1xona8ceoMVb8U:Yq9UaFBqzh8D+zliftIfMaxoa8ci2U

Malware Config

Targets

    • Target

      0d21084ba66020906561367b7fd3fc204065bcfdb56678e1396cb4d32df92b9b

    • Size

      8.3MB

    • MD5

      91b53026267ba8f38c21f8ab856648b4

    • SHA1

      ef13b28585a20e55bba284695e392e03362882d9

    • SHA256

      0d21084ba66020906561367b7fd3fc204065bcfdb56678e1396cb4d32df92b9b

    • SHA512

      d674938a2e93f3cfd9b35ad4a4685c943eb3078aa76ffe69b3e539bcd0923a1abbac1077b4e9e9af79ef3a8f43acf1f08363232a9506b3142d08180777b16c3a

    • SSDEEP

      196608:YqmEUkBfeZZwBj8r8DNIzhd61D+zHFclftIf55vUW1xona8ceoMVb8U:Yq9UaFBqzh8D+zliftIfMaxoa8ci2U

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks