General

  • Target

    353973888175ed3a55b55bbb9caa705d

  • Size

    936KB

  • Sample

    231225-xbq1raeaar

  • MD5

    353973888175ed3a55b55bbb9caa705d

  • SHA1

    a62386a85101098a94d61588dd716f1ebbf00be0

  • SHA256

    e4e367cdf3bd051008317a99681f3d5bef1082f52083357cc0480ab9a317493b

  • SHA512

    65c504d719efc98b625f145c6ecfecf4e019d12bc77a1bd3b1d1c050dc1d4eef079fd999d2d6f1d4fa2cfa543457c679ff57a4c0b560d68a3805e8531d933918

  • SSDEEP

    24576:0i98nUfykkc+ddd9IKr2bCPDf/9U7yGzlUUqmgxYtKQodW8Pz:0DnUfyWqjIRb2D39iyuxgxYt

Score
7/10

Malware Config

Targets

    • Target

      353973888175ed3a55b55bbb9caa705d

    • Size

      936KB

    • MD5

      353973888175ed3a55b55bbb9caa705d

    • SHA1

      a62386a85101098a94d61588dd716f1ebbf00be0

    • SHA256

      e4e367cdf3bd051008317a99681f3d5bef1082f52083357cc0480ab9a317493b

    • SHA512

      65c504d719efc98b625f145c6ecfecf4e019d12bc77a1bd3b1d1c050dc1d4eef079fd999d2d6f1d4fa2cfa543457c679ff57a4c0b560d68a3805e8531d933918

    • SSDEEP

      24576:0i98nUfykkc+ddd9IKr2bCPDf/9U7yGzlUUqmgxYtKQodW8Pz:0DnUfyWqjIRb2D39iyuxgxYt

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks