General

  • Target

    648e9a4869e391164bc334ebb1b1c2ccda882c3b0439289edee82a02933dbaab

  • Size

    7.3MB

  • Sample

    231111-tft2esad54

  • MD5

    a277247878996da07958e4789a66eebc

  • SHA1

    c097dc5dee71ed6cc52c0b14304e4c7b49ffee0c

  • SHA256

    648e9a4869e391164bc334ebb1b1c2ccda882c3b0439289edee82a02933dbaab

  • SHA512

    fa26913ba5f93800369b01af1d0061fb963b128ba0448a42fad463a3b2eff62d95411c20b85d2eff251a6fd033ed6c0b1947977a3870dd7b8d34b677876fcf1b

  • SSDEEP

    196608:91O0ImL/zrJUCzGYzcFIbBNjj21L1MB02DkmFJFN0oL:3O0IiXJUCz/zcQBNjjAay2DhFJH

Malware Config

Targets

    • Target

      648e9a4869e391164bc334ebb1b1c2ccda882c3b0439289edee82a02933dbaab

    • Size

      7.3MB

    • MD5

      a277247878996da07958e4789a66eebc

    • SHA1

      c097dc5dee71ed6cc52c0b14304e4c7b49ffee0c

    • SHA256

      648e9a4869e391164bc334ebb1b1c2ccda882c3b0439289edee82a02933dbaab

    • SHA512

      fa26913ba5f93800369b01af1d0061fb963b128ba0448a42fad463a3b2eff62d95411c20b85d2eff251a6fd033ed6c0b1947977a3870dd7b8d34b677876fcf1b

    • SSDEEP

      196608:91O0ImL/zrJUCzGYzcFIbBNjj21L1MB02DkmFJFN0oL:3O0IiXJUCz/zcQBNjjAay2DhFJH

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks