General

  • Target

    67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb

  • Size

    463KB

  • Sample

    240311-2bfbgaab88

  • MD5

    c153cd5022f4a261c43a788cfa55383b

  • SHA1

    104ae49df5564e1cb05a373af897626e85b989b4

  • SHA256

    67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb

  • SHA512

    03bb06e27dcccaa286772315ec590893d31a98bf5c6c78e6e64fdb07e20c3f8261ff8cbbbe0ec2bb55376724520bf0359e4538c1bd7203c5ab1009516eac8413

  • SSDEEP

    12288:lXa8so1u8Y1klZWILCkMGCfHHRgVHMaJ/B+CnGJlIv:lq8X88zZW7LfxCsC+C5v

Malware Config

Targets

    • Target

      67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb

    • Size

      463KB

    • MD5

      c153cd5022f4a261c43a788cfa55383b

    • SHA1

      104ae49df5564e1cb05a373af897626e85b989b4

    • SHA256

      67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb

    • SHA512

      03bb06e27dcccaa286772315ec590893d31a98bf5c6c78e6e64fdb07e20c3f8261ff8cbbbe0ec2bb55376724520bf0359e4538c1bd7203c5ab1009516eac8413

    • SSDEEP

      12288:lXa8so1u8Y1klZWILCkMGCfHHRgVHMaJ/B+CnGJlIv:lq8X88zZW7LfxCsC+C5v

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks