General

  • Target

    anygo.exe

  • Size

    101.1MB

  • Sample

    231119-yqnplscb5v

  • MD5

    86c8c71925193104ab11fb90b62a2c26

  • SHA1

    f8535c08a873045ee53f56735464f96de80bf18e

  • SHA256

    dd77515cfe3af20154c0b3f87abc3f7082d4c0875b646e018b87a8da8de83d80

  • SHA512

    d9800245bf12c5c3a0c6d1e4f315b5aa1bd90db0fb242fc01cbc58360973e678e162943b21c0abca11d3e798b0769b07b12ba5639ebf8c44124af5f931a72314

  • SSDEEP

    3145728:N9t1MVL42RB8P/JZn7+uZDO1ncY6Qf8A1s7x3VenQ:N9t1Mq+inJZ7RhO1cJQ0Co/

Malware Config

Targets

    • Target

      anygo.exe

    • Size

      101.1MB

    • MD5

      86c8c71925193104ab11fb90b62a2c26

    • SHA1

      f8535c08a873045ee53f56735464f96de80bf18e

    • SHA256

      dd77515cfe3af20154c0b3f87abc3f7082d4c0875b646e018b87a8da8de83d80

    • SHA512

      d9800245bf12c5c3a0c6d1e4f315b5aa1bd90db0fb242fc01cbc58360973e678e162943b21c0abca11d3e798b0769b07b12ba5639ebf8c44124af5f931a72314

    • SSDEEP

      3145728:N9t1MVL42RB8P/JZn7+uZDO1ncY6Qf8A1s7x3VenQ:N9t1Mq+inJZ7RhO1cJQ0Co/

    • Modifies firewall policy service

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks