General

  • Target

    3f898354b859e442fcf2068d3b1303d6

  • Size

    55KB

  • Sample

    240104-bqbcysgee5

  • MD5

    3f898354b859e442fcf2068d3b1303d6

  • SHA1

    2968fa6981964940cebedf828658035f37bc5726

  • SHA256

    c18b7955b030ee8db6cb28a7fbb5203175f4ed2260a533f59636893f3df33d1b

  • SHA512

    2246fb916bdbb28a80e8f77d015af1c720b69ad9a7317f348b5406c7b5094b9c32da001086c7d2439621d93e9c33702bb182b8e1d8a4ede572af9ccbb6147ce4

  • SSDEEP

    1536:SBgdzBml7uiBCbgeD0MsCZtkmdUEqT+dv:SB+VmluiBCbgeDAC7XdUEI+p

Malware Config

Targets

    • Target

      3f898354b859e442fcf2068d3b1303d6

    • Size

      55KB

    • MD5

      3f898354b859e442fcf2068d3b1303d6

    • SHA1

      2968fa6981964940cebedf828658035f37bc5726

    • SHA256

      c18b7955b030ee8db6cb28a7fbb5203175f4ed2260a533f59636893f3df33d1b

    • SHA512

      2246fb916bdbb28a80e8f77d015af1c720b69ad9a7317f348b5406c7b5094b9c32da001086c7d2439621d93e9c33702bb182b8e1d8a4ede572af9ccbb6147ce4

    • SSDEEP

      1536:SBgdzBml7uiBCbgeD0MsCZtkmdUEqT+dv:SB+VmluiBCbgeDAC7XdUEI+p

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Blocklisted process makes network request

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks