General

  • Target

    8676c0630339cf8050604cbad80e130cd7e40f602a8a25a9abf6c77442e75e00

  • Size

    137KB

  • Sample

    240315-1ext9ade77

  • MD5

    e112b3e759549eba794ded5b94482dfe

  • SHA1

    1e6b7d37bd43ab56cfde9c7420c56b71c57e39d1

  • SHA256

    8676c0630339cf8050604cbad80e130cd7e40f602a8a25a9abf6c77442e75e00

  • SHA512

    961c6ecc5a329e02de1b3b8eafb147ab9a726dcf03cc589b17e8daf852197a7b82f97bb314954b48eadf9f106993af7fc1c52faba6fa604e3e3af56d477cbd87

  • SSDEEP

    3072:dvs4dDXEGCLElJ1Tj4mYWR/R4nkPR/1aVr1G2J0YvXQtSmDCT:NPDLCLqIo5R4nM/4hDSYXQt/CT

Malware Config

Targets

    • Target

      8676c0630339cf8050604cbad80e130cd7e40f602a8a25a9abf6c77442e75e00

    • Size

      137KB

    • MD5

      e112b3e759549eba794ded5b94482dfe

    • SHA1

      1e6b7d37bd43ab56cfde9c7420c56b71c57e39d1

    • SHA256

      8676c0630339cf8050604cbad80e130cd7e40f602a8a25a9abf6c77442e75e00

    • SHA512

      961c6ecc5a329e02de1b3b8eafb147ab9a726dcf03cc589b17e8daf852197a7b82f97bb314954b48eadf9f106993af7fc1c52faba6fa604e3e3af56d477cbd87

    • SSDEEP

      3072:dvs4dDXEGCLElJ1Tj4mYWR/R4nkPR/1aVr1G2J0YvXQtSmDCT:NPDLCLqIo5R4nM/4hDSYXQt/CT

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks