Resubmissions

21-02-2024 18:45

240221-xeasyaea37 8

21-02-2024 18:40

240221-xbnwdsdh48 8

General

  • Target

    fortinet-7.0.0.0029-installer_jLa-0t1.exe

  • Size

    1.7MB

  • Sample

    240221-xbnwdsdh48

  • MD5

    9402ecd688bb22ae501ee75565e15b4d

  • SHA1

    5671c2706b73f9a68c20a8b41702e9fd161ae240

  • SHA256

    34278d6fd8874bc12cd7498ded79852c87219e7d5d9ca75facfa3deb98089f36

  • SHA512

    f43256d5e52750269679f95311fb097c555f92c0e61779f29e2a2d4dbc55c91c8dbb8fad8ecf5c0643ce650b7e85053d065a1f5779b3a463868a2fa92e294ec0

  • SSDEEP

    24576:C4nXubIQGyxbPV0db26WKas4/Xnna2AVFwCGRjICE2lfWW0qXgoW1zSB:Cqe3f6mson6fNCNltv

Malware Config

Targets

    • Target

      fortinet-7.0.0.0029-installer_jLa-0t1.exe

    • Size

      1.7MB

    • MD5

      9402ecd688bb22ae501ee75565e15b4d

    • SHA1

      5671c2706b73f9a68c20a8b41702e9fd161ae240

    • SHA256

      34278d6fd8874bc12cd7498ded79852c87219e7d5d9ca75facfa3deb98089f36

    • SHA512

      f43256d5e52750269679f95311fb097c555f92c0e61779f29e2a2d4dbc55c91c8dbb8fad8ecf5c0643ce650b7e85053d065a1f5779b3a463868a2fa92e294ec0

    • SSDEEP

      24576:C4nXubIQGyxbPV0db26WKas4/Xnna2AVFwCGRjICE2lfWW0qXgoW1zSB:Cqe3f6mson6fNCNltv

    • Creates new service(s)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks for any installed AV software in registry

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks