General

  • Target

    c354243142d98af51c361ddd0dcff2b8.bin

  • Size

    70MB

  • Sample

    231121-ddwjgabg29

  • MD5

    c354243142d98af51c361ddd0dcff2b8

  • SHA1

    b6b37167099f8103c24d5ed2b700e214cc1416bc

  • SHA256

    26a2aaf00982484f0f18430765200df95540cab4dfc983e22370fab61d2d24a3

  • SHA512

    09de5ece9f4467a5783c749df6af9121e0b79db8731b8ed094bbfffbd539f251f4fde324cbf6314fdcbf7b838c391bb4e4178d4047107a84be1bf3bd07e9000c

  • SSDEEP

    1572864:34/4rzOchPPndUX6wMv4O/il6/MsLsBSEJ/10MwKztS4MmGY7:4kqcdPdUqjzi/sLsBd/VwR4MtY7

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://bit.ly/e0Mw9w

Targets

    • Target

      c354243142d98af51c361ddd0dcff2b8.bin

    • Size

      70MB

    • MD5

      c354243142d98af51c361ddd0dcff2b8

    • SHA1

      b6b37167099f8103c24d5ed2b700e214cc1416bc

    • SHA256

      26a2aaf00982484f0f18430765200df95540cab4dfc983e22370fab61d2d24a3

    • SHA512

      09de5ece9f4467a5783c749df6af9121e0b79db8731b8ed094bbfffbd539f251f4fde324cbf6314fdcbf7b838c391bb4e4178d4047107a84be1bf3bd07e9000c

    • SSDEEP

      1572864:34/4rzOchPPndUX6wMv4O/il6/MsLsBSEJ/10MwKztS4MmGY7:4kqcdPdUqjzi/sLsBd/VwR4MtY7

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks