General

  • Target

    e885c7052cdf54c6c7e05ec887fae61ec8e3ff448f0af8b116bb860e1fc362f9

  • Size

    786KB

  • Sample

    240314-anpxwsgb47

  • MD5

    08d317952e761ac990433660da9c1859

  • SHA1

    e7e1f7a7b9a9d4c8a4245f232ffcf7bca4f8cffb

  • SHA256

    e885c7052cdf54c6c7e05ec887fae61ec8e3ff448f0af8b116bb860e1fc362f9

  • SHA512

    f2835df8f8ea9bfddffd2b86e5a818f672a5ea3a9a3ccf7c52f83212d7aafdbc17c95132a94ebcb4af01437012357bfb00b3815a44ec0d0474c862779662b9ef

  • SSDEEP

    12288:YEQoSnqhUaG5dS5+4tJTrbwXZGPYSGHR63aJ8FCFYUbnhCk0+Mxr+:YoUagUzJvyAoA3aJ8FC6+MY

Malware Config

Targets

    • Target

      e885c7052cdf54c6c7e05ec887fae61ec8e3ff448f0af8b116bb860e1fc362f9

    • Size

      786KB

    • MD5

      08d317952e761ac990433660da9c1859

    • SHA1

      e7e1f7a7b9a9d4c8a4245f232ffcf7bca4f8cffb

    • SHA256

      e885c7052cdf54c6c7e05ec887fae61ec8e3ff448f0af8b116bb860e1fc362f9

    • SHA512

      f2835df8f8ea9bfddffd2b86e5a818f672a5ea3a9a3ccf7c52f83212d7aafdbc17c95132a94ebcb4af01437012357bfb00b3815a44ec0d0474c862779662b9ef

    • SSDEEP

      12288:YEQoSnqhUaG5dS5+4tJTrbwXZGPYSGHR63aJ8FCFYUbnhCk0+Mxr+:YoUagUzJvyAoA3aJ8FC6+MY

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks