General

  • Target

    1ac42a021ad188affefacdb2042c70734aacced93d80fb221d2bf64706f52421

  • Size

    806KB

  • Sample

    240305-wstmjadc7s

  • MD5

    4be7d68d7585adabc52e87b4a3f7663a

  • SHA1

    277b2f2adafde803fc9d06ffff4a0b7daf38e2b7

  • SHA256

    1ac42a021ad188affefacdb2042c70734aacced93d80fb221d2bf64706f52421

  • SHA512

    a27ff12d8a9c47f075858ff915d99ffe2583b1a4e5710364cc08edc6fa4ce123733c8bae3a682e40145525425b8e835996df340e65882ed916ad67397bd06d14

  • SSDEEP

    12288:oGHasii9BFtxHG+s9xamVLuLrmEyTGmE0Mbe9STFg4AIpk2XyaQwsLyKKqYNHy:86FTHOLa1/IE0WQz4J22uw06ly

Malware Config

Targets

    • Target

      1ac42a021ad188affefacdb2042c70734aacced93d80fb221d2bf64706f52421

    • Size

      806KB

    • MD5

      4be7d68d7585adabc52e87b4a3f7663a

    • SHA1

      277b2f2adafde803fc9d06ffff4a0b7daf38e2b7

    • SHA256

      1ac42a021ad188affefacdb2042c70734aacced93d80fb221d2bf64706f52421

    • SHA512

      a27ff12d8a9c47f075858ff915d99ffe2583b1a4e5710364cc08edc6fa4ce123733c8bae3a682e40145525425b8e835996df340e65882ed916ad67397bd06d14

    • SSDEEP

      12288:oGHasii9BFtxHG+s9xamVLuLrmEyTGmE0Mbe9STFg4AIpk2XyaQwsLyKKqYNHy:86FTHOLa1/IE0WQz4J22uw06ly

    • Detects executables containing possible sandbox analysis VM usernames

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks