General

  • Target

    aa72bfdc620fb1cc66784c18e1763682b314aa90948eae1404ef9a642dd9f09b

  • Size

    422KB

  • Sample

    240310-3nsb8sec69

  • MD5

    4847018dc65107416998a017db376e73

  • SHA1

    8b42e1be21fa00b260f1da1c03d84562b07456b6

  • SHA256

    aa72bfdc620fb1cc66784c18e1763682b314aa90948eae1404ef9a642dd9f09b

  • SHA512

    50a8b70736cc2edd6bd3ff376519ff5e1fa37a6c13d17d078582e921b82b28a6d28cf1ce7796c3a6814743247ae6431d464d71a353136d8c871ee50737180216

  • SSDEEP

    12288:lXa8si75XjwnjUOp6pigxDr6uSxg5bwGbf:lq8T1jwjvp6p1X6Jy5bTf

Malware Config

Targets

    • Target

      aa72bfdc620fb1cc66784c18e1763682b314aa90948eae1404ef9a642dd9f09b

    • Size

      422KB

    • MD5

      4847018dc65107416998a017db376e73

    • SHA1

      8b42e1be21fa00b260f1da1c03d84562b07456b6

    • SHA256

      aa72bfdc620fb1cc66784c18e1763682b314aa90948eae1404ef9a642dd9f09b

    • SHA512

      50a8b70736cc2edd6bd3ff376519ff5e1fa37a6c13d17d078582e921b82b28a6d28cf1ce7796c3a6814743247ae6431d464d71a353136d8c871ee50737180216

    • SSDEEP

      12288:lXa8si75XjwnjUOp6pigxDr6uSxg5bwGbf:lq8T1jwjvp6p1X6Jy5bTf

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks