General

  • Target

    fb545037ab489bdbe428559235a61cee.bin

  • Size

    4.4MB

  • Sample

    240114-ep3btsbgej

  • MD5

    ca23b1e9977e45dc084e4a475997d3e5

  • SHA1

    bc881b3eddcf2871d313f51f3cd92341b6ed71fd

  • SHA256

    ec48a51e6b403fc7c0fffbd6cc7fc496449700b92e0ee9bd953915b0d0b5800e

  • SHA512

    68eb3a4aea7c65be3468fee767c47500fdca9c801fb8c0e2a08607815b3cab056fa5deaf4e3eb5cf4adadb38d03e14992104521616c4ef7b2aa4f03b409dfbd9

  • SSDEEP

    98304:40+27QGlj17VQ/Zbnu29sXbZHnRP7zSkNE0Zu2KhjgX:WeTV8pdcbZHRnh1jKhjgX

Malware Config

Targets

    • Target

      7da786b32ec861208fc6a01b94d4eee4867b26dabfe214b66c9009b2f0222050.exe

    • Size

      4.6MB

    • MD5

      fb545037ab489bdbe428559235a61cee

    • SHA1

      74b0dccbaaa27d7acc64427be1dee07269d0c71c

    • SHA256

      7da786b32ec861208fc6a01b94d4eee4867b26dabfe214b66c9009b2f0222050

    • SHA512

      14329cf8f45e65c107356c318aa19c334938863dcbb15df25b4218e6e32461afc0a1d0d9118a483db281824103e681e725820321347cd62c42dede0055c6b76f

    • SSDEEP

      98304:3GA0UBXf1laFPEoSmXMAgpe48eDQZNkMOvr/juAS5i2zNsO:2A1fraU2ueZecTkMOD/juAS/Ns

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks