General

  • Target

    217d8ded3c28fba290c4a41b313ac685.exe

  • Size

    200KB

  • Sample

    240310-wy5lzshg75

  • MD5

    217d8ded3c28fba290c4a41b313ac685

  • SHA1

    1309687252e1fdc9407f9fe7af4f8886fe344994

  • SHA256

    77940969714dc102b3cc802299080a75e1122cfa1323b49d94e7e3bffa6ec8b7

  • SHA512

    7f448fa84b3046995461d59438a18a35b5f98d9787fc0979fe3fa5712298917fc37ffbb17b6b43da2ac0b3ce9bf1b905fe1e96cd3f780738c06b5b2536b5a5bd

  • SSDEEP

    3072:NvHcxyLXzal7/+6eFWu76BjQCxCZAVXPi0Q1r4N8hUsOArUuyUb9:NH7LXeNm6EWDjQCxCGxPi0Q1tUBA6U

Malware Config

Targets

    • Target

      217d8ded3c28fba290c4a41b313ac685.exe

    • Size

      200KB

    • MD5

      217d8ded3c28fba290c4a41b313ac685

    • SHA1

      1309687252e1fdc9407f9fe7af4f8886fe344994

    • SHA256

      77940969714dc102b3cc802299080a75e1122cfa1323b49d94e7e3bffa6ec8b7

    • SHA512

      7f448fa84b3046995461d59438a18a35b5f98d9787fc0979fe3fa5712298917fc37ffbb17b6b43da2ac0b3ce9bf1b905fe1e96cd3f780738c06b5b2536b5a5bd

    • SSDEEP

      3072:NvHcxyLXzal7/+6eFWu76BjQCxCZAVXPi0Q1r4N8hUsOArUuyUb9:NH7LXeNm6EWDjQCxCGxPi0Q1tUBA6U

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks