General

  • Target

    7909ec6b38a5449b4747315b46337fbc

  • Size

    1.3MB

  • Sample

    240127-cxtzbabce6

  • MD5

    7909ec6b38a5449b4747315b46337fbc

  • SHA1

    2d0d868ab24332ad85287b8ddb70c80bbbb00e01

  • SHA256

    22d1537bc9a9c7661995f1c03bac438eec8af2f0cf4a76977c9baaa1a95faa7b

  • SHA512

    b9d366f1725e597e95163de939265bc5ffefe54c10c18f5fb9637702716557d48e9614356d183e9c24b05612076ef1a710db75c32ca7ad8d5cc6f813735f38b4

  • SSDEEP

    24576:CacYMIaMt5yNo6TLVx1O7Trp9k3OFRKHoSDDPlUFm8R+V5DhN97Z7GWgMoZzwooV:JTT41PI7T1wOFRtg6Fm8R+V5F7Z73gVK

Malware Config

Targets

    • Target

      7909ec6b38a5449b4747315b46337fbc

    • Size

      1.3MB

    • MD5

      7909ec6b38a5449b4747315b46337fbc

    • SHA1

      2d0d868ab24332ad85287b8ddb70c80bbbb00e01

    • SHA256

      22d1537bc9a9c7661995f1c03bac438eec8af2f0cf4a76977c9baaa1a95faa7b

    • SHA512

      b9d366f1725e597e95163de939265bc5ffefe54c10c18f5fb9637702716557d48e9614356d183e9c24b05612076ef1a710db75c32ca7ad8d5cc6f813735f38b4

    • SSDEEP

      24576:CacYMIaMt5yNo6TLVx1O7Trp9k3OFRKHoSDDPlUFm8R+V5DhN97Z7GWgMoZzwooV:JTT41PI7T1wOFRtg6Fm8R+V5F7Z73gVK

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks