General

  • Target

    0d7fb42424e1621f142820df8c2a8655

  • Size

    334KB

  • Sample

    231219-mx9d4sgaak

  • MD5

    0d7fb42424e1621f142820df8c2a8655

  • SHA1

    055ef2b1d46f7afde1e9215abbb88cf0b2d17ede

  • SHA256

    fe8c12aecba82c1df677305d11841c7f0055a49b06ca1229ae6136a73271d231

  • SHA512

    8b925762711aad0af5040f3d4d09747c0a2f6687aabbf4b6965cb16fc29a8794bacc7013cbf37bb9ad67b66e71cef8b4a2e92be8d3e6042364d1ef87e1982aaa

  • SSDEEP

    6144:SlQCdVupjjMsYe4rxdJmDgTX7aM71SJMRl6ny4QAXIiWwnhY5WK5o2U2Z:S6Cupjj74rxdkgzz71SMR/7AIiWwnW5P

Malware Config

Targets

    • Target

      0d7fb42424e1621f142820df8c2a8655

    • Size

      334KB

    • MD5

      0d7fb42424e1621f142820df8c2a8655

    • SHA1

      055ef2b1d46f7afde1e9215abbb88cf0b2d17ede

    • SHA256

      fe8c12aecba82c1df677305d11841c7f0055a49b06ca1229ae6136a73271d231

    • SHA512

      8b925762711aad0af5040f3d4d09747c0a2f6687aabbf4b6965cb16fc29a8794bacc7013cbf37bb9ad67b66e71cef8b4a2e92be8d3e6042364d1ef87e1982aaa

    • SSDEEP

      6144:SlQCdVupjjMsYe4rxdJmDgTX7aM71SJMRl6ny4QAXIiWwnhY5WK5o2U2Z:S6Cupjj74rxdkgzz71SMR/7AIiWwnW5P

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks