General

  • Target

    15b0983ebdd199738ffbe68b4d6e7bc5de374b2e772e55850ae0776cf141f8f8

  • Size

    1.4MB

  • Sample

    240315-wd91zagh44

  • MD5

    025d0affe4c8f5fff42e13cec20bf2dd

  • SHA1

    c97d4ca3f78d8a31d1b2c7b828605e4a7c029479

  • SHA256

    15b0983ebdd199738ffbe68b4d6e7bc5de374b2e772e55850ae0776cf141f8f8

  • SHA512

    f9c62a39d4d2704ca89e5899c08d81e4d0d9d219f7c8f2732a90e64fc6ce80982d9e7f15c5475798442cdcd5f334b2b6009a3b772852aca8d599ec8e748865b8

  • SSDEEP

    24576:bSLglUqiUWCECkZ2xery9fmZxd2f2rSjuLenVl3BULqNmn/Li41Ik8soQn5zjBT2:bNuE3kZ2WefmZxd2ftuqYnTj1IPs1nRk

Malware Config

Targets

    • Target

      15b0983ebdd199738ffbe68b4d6e7bc5de374b2e772e55850ae0776cf141f8f8

    • Size

      1.4MB

    • MD5

      025d0affe4c8f5fff42e13cec20bf2dd

    • SHA1

      c97d4ca3f78d8a31d1b2c7b828605e4a7c029479

    • SHA256

      15b0983ebdd199738ffbe68b4d6e7bc5de374b2e772e55850ae0776cf141f8f8

    • SHA512

      f9c62a39d4d2704ca89e5899c08d81e4d0d9d219f7c8f2732a90e64fc6ce80982d9e7f15c5475798442cdcd5f334b2b6009a3b772852aca8d599ec8e748865b8

    • SSDEEP

      24576:bSLglUqiUWCECkZ2xery9fmZxd2f2rSjuLenVl3BULqNmn/Li41Ik8soQn5zjBT2:bNuE3kZ2WefmZxd2ftuqYnTj1IPs1nRk

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks