General

  • Target

    53135279da7510d6e545cafe6ae9b187

  • Size

    192KB

  • Sample

    240111-ks4lyscghj

  • MD5

    53135279da7510d6e545cafe6ae9b187

  • SHA1

    bafc629349aba86757513280d8f94017eea9f9be

  • SHA256

    53ed7185b1d7417eeb34b6d33aee7659216f7564d3075997d4f2593de5509c91

  • SHA512

    2e0553f785165e326a019625494fa939fec50b21e567d3d19b0ae39f58c90a3d5fa5680ec70f87a011969db91ff3392eab3108f895b6a6ace194776e6fb91e86

  • SSDEEP

    3072:cH69DiMTdgP6RvRP5VwYznpDBTvWwvbSlJHy/r/zMJmd7DMXj3S/Z:Jh3CSR1Q6LTvNvySj/zCgDMe

Malware Config

Targets

    • Target

      53135279da7510d6e545cafe6ae9b187

    • Size

      192KB

    • MD5

      53135279da7510d6e545cafe6ae9b187

    • SHA1

      bafc629349aba86757513280d8f94017eea9f9be

    • SHA256

      53ed7185b1d7417eeb34b6d33aee7659216f7564d3075997d4f2593de5509c91

    • SHA512

      2e0553f785165e326a019625494fa939fec50b21e567d3d19b0ae39f58c90a3d5fa5680ec70f87a011969db91ff3392eab3108f895b6a6ace194776e6fb91e86

    • SSDEEP

      3072:cH69DiMTdgP6RvRP5VwYznpDBTvWwvbSlJHy/r/zMJmd7DMXj3S/Z:Jh3CSR1Q6LTvNvySj/zCgDMe

    • Modifies AppInit DLL entries

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks