General

  • Target

    9e2d5c489aabda0e5b15db11547c2a69e7eaa552693baee8edc80b6e66a2e3de.exe.compressed

  • Size

    160KB

  • Sample

    240129-afl62afbfm

  • MD5

    9d2b5315aac351354cf846bc3076b0da

  • SHA1

    a00965c41423e010f879122c1d82c6ae89296f68

  • SHA256

    eecd80841c3f42e70b77ba2a4f9b61e5c1bcd072871ab54dd9804580ee737ef6

  • SHA512

    43808bf7e65cc7e8b6db4d9adf70947ef1bd9772936973fab0f756a17a91cbacf8461c1d12f6be0ff3c5e2c0e12d12923cc90de4a290f5ec0d308340e4287a05

  • SSDEEP

    3072:KFB3O3IRORghwODMJlz1dxoOXwupfRD3hSHzq3TL4MNTIh/zovUMvz:cBZcIDqvysbpfR9STG0hiz

Malware Config

Targets

    • Target

      9e2d5c489aabda0e5b15db11547c2a69e7eaa552693baee8edc80b6e66a2e3de.exe.compressed

    • Size

      160KB

    • MD5

      9d2b5315aac351354cf846bc3076b0da

    • SHA1

      a00965c41423e010f879122c1d82c6ae89296f68

    • SHA256

      eecd80841c3f42e70b77ba2a4f9b61e5c1bcd072871ab54dd9804580ee737ef6

    • SHA512

      43808bf7e65cc7e8b6db4d9adf70947ef1bd9772936973fab0f756a17a91cbacf8461c1d12f6be0ff3c5e2c0e12d12923cc90de4a290f5ec0d308340e4287a05

    • SSDEEP

      3072:KFB3O3IRORghwODMJlz1dxoOXwupfRD3hSHzq3TL4MNTIh/zovUMvz:cBZcIDqvysbpfR9STG0hiz

    • Detects command variations typically used by ransomware

    • UPX dump on OEP (original entry point)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks