General

  • Target

    tokenbot.exe

  • Size

    46.6MB

  • Sample

    240114-fb76laccdq

  • MD5

    f7e65b56e6f0fb6bf053392f4f5cf30f

  • SHA1

    cdbfb7d08076434a952db336386981635a620496

  • SHA256

    92dc3147e96d740dfbf3eeed5482328ffd434671e9b338e89660fd5641bfe35d

  • SHA512

    d81e54e51267cccf8471180d68ae248b5031608622e3c6734f811236adb252cb2d75fd5419fecab4295cebda6ad7bd6e369fabd8099f105c89f703ab04e4cff8

  • SSDEEP

    393216:Wh9S2nnx8qp3etEL+9qzT7Ck+7q301JI71bWXiWCUi:Q9Dnx3F+9q/Z301yJtVUi

Malware Config

Targets

    • Target

      tokenbot.exe

    • Size

      46.6MB

    • MD5

      f7e65b56e6f0fb6bf053392f4f5cf30f

    • SHA1

      cdbfb7d08076434a952db336386981635a620496

    • SHA256

      92dc3147e96d740dfbf3eeed5482328ffd434671e9b338e89660fd5641bfe35d

    • SHA512

      d81e54e51267cccf8471180d68ae248b5031608622e3c6734f811236adb252cb2d75fd5419fecab4295cebda6ad7bd6e369fabd8099f105c89f703ab04e4cff8

    • SSDEEP

      393216:Wh9S2nnx8qp3etEL+9qzT7Ck+7q301JI71bWXiWCUi:Q9Dnx3F+9q/Z301yJtVUi

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks