General

  • Target

    7475e53c347b033821dff38d0228b7c5594b74bb3d1c4c3fb48027178372ce1d

  • Size

    1.6MB

  • Sample

    240309-24va4aea2y

  • MD5

    7c7763e27e7fd9723a4c80be5d924f39

  • SHA1

    83c627629f2d692999b23e1b22c6fa08f9584838

  • SHA256

    7475e53c347b033821dff38d0228b7c5594b74bb3d1c4c3fb48027178372ce1d

  • SHA512

    da35d68af2224ac1a18b1bc80b12efdad47ee3aa53a09008199a3eaaea241336ee73c332348fc57f85c551322b44ea205f14adb90807b8f139ccd9e5f8b69eef

  • SSDEEP

    24576:lq8zHke/6BJLPuYAKe0+Fj5OHcpq1ycwsi/j5za4VAXMfa8sX0F01ckFtVoWY2RQ:LHke/6HPjCr81yrdVA4F0ekvFCZM3A

Malware Config

Targets

    • Target

      7475e53c347b033821dff38d0228b7c5594b74bb3d1c4c3fb48027178372ce1d

    • Size

      1.6MB

    • MD5

      7c7763e27e7fd9723a4c80be5d924f39

    • SHA1

      83c627629f2d692999b23e1b22c6fa08f9584838

    • SHA256

      7475e53c347b033821dff38d0228b7c5594b74bb3d1c4c3fb48027178372ce1d

    • SHA512

      da35d68af2224ac1a18b1bc80b12efdad47ee3aa53a09008199a3eaaea241336ee73c332348fc57f85c551322b44ea205f14adb90807b8f139ccd9e5f8b69eef

    • SSDEEP

      24576:lq8zHke/6BJLPuYAKe0+Fj5OHcpq1ycwsi/j5za4VAXMfa8sX0F01ckFtVoWY2RQ:LHke/6HPjCr81yrdVA4F0ekvFCZM3A

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks