General

  • Target

    c8e765b6db256a110603ff9ff1d0e813

  • Size

    444KB

  • Sample

    240314-sbev9seh71

  • MD5

    c8e765b6db256a110603ff9ff1d0e813

  • SHA1

    ba122cdb7376e4500225736a04c6057c5c3ee067

  • SHA256

    4273bb4352f74598bbf21cd54ca03b7de93b2c4df6b52d610d0b578d23d4b9d6

  • SHA512

    814fb297ffdd606b5199c36b6131fec143e4a0dcdeac93378406e32c97f8760ec0ae73e230772ad42e647855e9c05464f7240be0f630ceaaf21dd1ffad233e54

  • SSDEEP

    12288:/2xgqmXoHud+YLGLbfvWkHFkyqhX9M08WHm:+xgqmQQ6LbfTlkyqV9M08WG

Malware Config

Targets

    • Target

      c8e765b6db256a110603ff9ff1d0e813

    • Size

      444KB

    • MD5

      c8e765b6db256a110603ff9ff1d0e813

    • SHA1

      ba122cdb7376e4500225736a04c6057c5c3ee067

    • SHA256

      4273bb4352f74598bbf21cd54ca03b7de93b2c4df6b52d610d0b578d23d4b9d6

    • SHA512

      814fb297ffdd606b5199c36b6131fec143e4a0dcdeac93378406e32c97f8760ec0ae73e230772ad42e647855e9c05464f7240be0f630ceaaf21dd1ffad233e54

    • SSDEEP

      12288:/2xgqmXoHud+YLGLbfvWkHFkyqhX9M08WHm:+xgqmQQ6LbfTlkyqV9M08WG

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks