General

  • Target

    a3235608a45546b89e2e06e257ed47fc

  • Size

    964KB

  • Sample

    240225-hh1ffaeb73

  • MD5

    a3235608a45546b89e2e06e257ed47fc

  • SHA1

    69409415761dc6a3d215359c1c0bb7570532408c

  • SHA256

    669f00742f8622c69eeba62416b157d7fe894df352c1eff56c35d957ceab5148

  • SHA512

    ee44bf591ee65b6737749b6409de6210d61b5ee3cc637517e3b32a8e3458c7a39778905da8950368f1fa0eb9c0d729cb506332e2a16b722234292d895cdf42b2

  • SSDEEP

    12288:Q2PXPk618mS7lRFtFpzpmGFYZJ+qNo+kbNMVYuybGGGoYYW:rPRSRj/pmGFcYH+kJ/uyK

Malware Config

Targets

    • Target

      a3235608a45546b89e2e06e257ed47fc

    • Size

      964KB

    • MD5

      a3235608a45546b89e2e06e257ed47fc

    • SHA1

      69409415761dc6a3d215359c1c0bb7570532408c

    • SHA256

      669f00742f8622c69eeba62416b157d7fe894df352c1eff56c35d957ceab5148

    • SHA512

      ee44bf591ee65b6737749b6409de6210d61b5ee3cc637517e3b32a8e3458c7a39778905da8950368f1fa0eb9c0d729cb506332e2a16b722234292d895cdf42b2

    • SSDEEP

      12288:Q2PXPk618mS7lRFtFpzpmGFYZJ+qNo+kbNMVYuybGGGoYYW:rPRSRj/pmGFcYH+kJ/uyK

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks